Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
d52dea6c5013ad61759a50ded679eebb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d52dea6c5013ad61759a50ded679eebb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d52dea6c5013ad61759a50ded679eebb_JaffaCakes118.html
-
Size
98KB
-
MD5
d52dea6c5013ad61759a50ded679eebb
-
SHA1
1400dab8447ae4fb5a9b0e4e6b27eada3bc2d026
-
SHA256
0d4dcbf4464860512ac8b071c9e1f734a5f0bfc64155d7e3e5c532af87e131ef
-
SHA512
91c470cddcc9ca228291120439d67214fe65f1d94dc8c898172bb2f5521d54ca4eb9295e2968ae507829afff1afa31eb3216a881141bab587723341e46d417bd
-
SSDEEP
3072:izHwprA5DfN3spu8EzdsiVVGP3tq8IuC6+OrEJAc7XTTK1CZ05R4aE3cKakIRO1q:0wp8q6A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 800 msedge.exe 800 msedge.exe 1476 identity_helper.exe 1476 identity_helper.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 800 wrote to memory of 3568 800 msedge.exe 83 PID 800 wrote to memory of 3568 800 msedge.exe 83 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 2996 800 msedge.exe 84 PID 800 wrote to memory of 1840 800 msedge.exe 85 PID 800 wrote to memory of 1840 800 msedge.exe 85 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86 PID 800 wrote to memory of 4520 800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d52dea6c5013ad61759a50ded679eebb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce0eb46f8,0x7ffce0eb4708,0x7ffce0eb47182⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,2883326727102220383,14297104349447968761,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b73c190cf20ec95469a039496803c707
SHA1745a44499d8d097301f62dff0d12acdf59589d12
SHA25688c0ff0c9078915aa495a7e3919d6c621c1ea52d10cc693c1f10f7becdea87c1
SHA51263edbefd2b2f5c8d8a8bf1d2634b59d139035b7924ec0055dba4ff43f8cdfff8880d4ea3a75803c0da75ab89b1388c2818d25599f61062296c6589e7fa51369f
-
Filesize
2KB
MD5baa458ab1a5d11fb7e2edea13c0bc216
SHA1aee6fc25907e2014e28b68f6aceef8259036b95e
SHA2560313df8787ff12750eeefcf4b7e767fa6da2752fe12738675f5ae48be47a1ea4
SHA512b8e0046d88e91e40abd034653590b2e999cedd3f3327c2e7f102c4206a17d0199cb070056a6a22076c627d8e653aea849d404e0b31e027aaa6164c650014dac5
-
Filesize
5KB
MD5d6933a3a1fb74e689a1e42649945c36b
SHA1f9f070bc0a673a1a374d0c653ded864efc03fbc4
SHA25602a1748fa48eefa325ddb8f599c72f0875b624250bcf3db14b3c9a6fd6f9fc71
SHA5126b56b6ed5c6da82faedfdc44ea87091837a9cc84f4fafeef76ff17b8487d7fdae59bc835ee760c1e53913236581e10592c4002aa9f61a59f5aef197b21015e73
-
Filesize
6KB
MD52818ea5209965fd2f4e8c63ae0320c93
SHA17ee48d1080985a3f9b06bb6a64c2b24236d2da39
SHA256bc24fbc395d968874859305705c9f7e1bb7470012e2f051d5e3f9ab6d615bf12
SHA5126c278e419375a16a1faf59ed1a230b5707c82bc7355069952a24a1a266d20b3d73b9489d1f895ac25248a1f7bc31658723e31aa54fa08d9ef9b22cd3e22a6451
-
Filesize
7KB
MD57d03927a73410c0fffbb57d51acea860
SHA19e45f1fa5972675367f5b88d5b88fe2dde36e770
SHA256111b8f6046c514ce118b6bf7f5754c8025d494ac35ba695d6d920320cd43663f
SHA512c478fe35ee697c274922d88cf56f244adbbd81123aa8155745a03d44b02c1c475fded582c1563f67905d1ab778a59b850b01f653a80310432d7528f373bce9ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52271c22348ea7a6f204089d4442f2bf8
SHA11ea0b75815936ac626969711c832c7c778625821
SHA256b0b1c8a628db18573b092c75c5ab2fd7296eafef258eeea68db76533db7e0365
SHA5127877d0865542862f5df97ad3c4f676b294d11d42fa17c5c6aefa149bdf6c9965de1e4cb92a25ef6187c950a69d3b1b9017c7aa94aa2c513503209210f14937c7