Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
d520dd428282cb3585139805a92620f8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d520dd428282cb3585139805a92620f8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d520dd428282cb3585139805a92620f8_JaffaCakes118.html
-
Size
85KB
-
MD5
d520dd428282cb3585139805a92620f8
-
SHA1
afdc76a65093ffc01a54db1e4a77c551a35d63ef
-
SHA256
2602a4295dbe2d58644808aaf250ed0b10a743635a08eab5eb72d137c4839d95
-
SHA512
d09b36c19e8f658c0c1a5cc98837959fa91066effbb0b1b2bfd5657eb323c5ca51099a47c7593ef7d84d7116195a1c868aac84abf042b7bb5b6b016b1c3e95ea
-
SSDEEP
1536:wqszrHoEwIVtmpCeTTG1s4kAD0bUwHmE4UES0thx:wqh2tMCeTTGPkAD0bUwHmE4UES0thx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 3992 msedge.exe 3992 msedge.exe 1572 identity_helper.exe 1572 identity_helper.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3172 3992 msedge.exe 83 PID 3992 wrote to memory of 3172 3992 msedge.exe 83 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 1736 3992 msedge.exe 84 PID 3992 wrote to memory of 2036 3992 msedge.exe 85 PID 3992 wrote to memory of 2036 3992 msedge.exe 85 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86 PID 3992 wrote to memory of 3544 3992 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d520dd428282cb3585139805a92620f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff992e646f8,0x7ff992e64708,0x7ff992e647182⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18285468910782175222,2697081434124839296,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5304bfe292c6bb532c1e26ebcade7be93
SHA10ed5814b677841ae4ea49dfc4f16148edc5e1b06
SHA256ce1cf3bb36488b6a503a3b3c1341876cdf7cf6ff480ae215465790b8e68c8b3d
SHA51258f7cf57ff05c261c50551c59eb4b54911a073cc524e55e64af6227a5dc7822b999a0715a608b18289e9dd685c3e65bdfea0baf8a4cafdbdd6eb3b8cd9ee2879
-
Filesize
1KB
MD5fc4f494f3e1b07a44ce965450e2c4884
SHA1b6cbd7d90bd1965c79502a066f1bda05d42116d3
SHA2563f1a9813211c8f259966c0a1207acfa4317090d017ed5a654a5a2ae1f3a4ea82
SHA5127266fb0ea7f3836e59affb14b993641c68bea3e5f1368fb3d7b1fa49c2506682dfa1dc2022e3b1db73ca6cb84dfb06c179022ad46c45371b04fff9ea1f006f6a
-
Filesize
5KB
MD511b0ca01e8668eac5560ed0a463e187a
SHA123783fe547bfe60f612f39a3291da998bd23bbf8
SHA25607859313424d72fd22f4bd0123ec0e513aec224e5ec722cadcd89ba616375a70
SHA51221cc4a5f8ad833c148494d93753297ded8e531983ce963d2dd8042023f38d66b9058b56ec036d4912f50802e01bac8db409960f24b7c92009b81326c164bd39e
-
Filesize
7KB
MD58aeeea397bf3bb322edf307770eeb576
SHA17b9460c282cf55229e003fd2183cce7a2980ab54
SHA256f98a37e1e1e2153330d3f48afa3992630f0a7155188372bbba99c870ca5d6d15
SHA512dde93eacbd63511e37be24c60cde20cf9fa1bc54629e77f9e580e6b873524794d86cc54538229f28fa1500ce10338f43ff900118feb8d17ec583af5c37038dea
-
Filesize
6KB
MD5dee9a1bbefb1e0ea85018bb967cbdedd
SHA1fe84a654a0fcc3620a31946d32cfd71b6d8b335f
SHA256b2f6e928d4a74b2e208c9ef828a999e3fb7ab2ae39f3e9eaa50e4d37f174cb30
SHA51272e8556e5a102de4dd9c101420de1efd285781ec0f728fd98c028e0339d6324de398a16f3f32d564bdf1c51f7f77d5fb15bfb5bf88c3382e0616a1e397cdc35c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a17d6d9f2add809c3b1ef7583b75c5af
SHA1b4b9806c8317f0e203f04be2c251c258d85d836c
SHA25619cb3151b2b399599bd7603beffc81d454d351b10d4e2e198f96617f4f6c447e
SHA5127890c932c3bfc8f92103fbc1f3352e3d3645b7d73e27ab7d059d60c73df22a8b380ec0976dd23e7523a3b7f3402f7acb6fe1372262382636465f410f19a93c16