Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
d51af8f318723cae83a207913ee1b45f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d51af8f318723cae83a207913ee1b45f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d51af8f318723cae83a207913ee1b45f_JaffaCakes118.html
-
Size
11KB
-
MD5
d51af8f318723cae83a207913ee1b45f
-
SHA1
fd4702a81095f8e5d5daa46d575a0883b9e1bdbd
-
SHA256
396df6a062e43dc505b7f71481c9e7554ff0a933b0ae74dceb25e8af9069fb72
-
SHA512
98b7912e8e5445374d22a71214cbd02e05f0f31077e525f4dae3faae232782c7d38f47344bb372aa9f59833de1902200b6dabb1bddd09a0d4dcaf6b9531606cf
-
SSDEEP
192:cljRownrFkIdfNpEv0Hk98VNKLCgczhmtp38414HgUyjBvS+Uz:c1Dr9q86Omzp19UKBvBM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 4188 msedge.exe 4188 msedge.exe 3952 identity_helper.exe 3952 identity_helper.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4188 wrote to memory of 3208 4188 msedge.exe 85 PID 4188 wrote to memory of 3208 4188 msedge.exe 85 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 744 4188 msedge.exe 86 PID 4188 wrote to memory of 2856 4188 msedge.exe 87 PID 4188 wrote to memory of 2856 4188 msedge.exe 87 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88 PID 4188 wrote to memory of 1680 4188 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d51af8f318723cae83a207913ee1b45f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffed34f46f8,0x7ffed34f4708,0x7ffed34f47182⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5342194165152041608,6440355897024821026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5118569018ca9ada1140302c84ace768f
SHA1ed7eca54e586c7e5f5bcf5683fc17996157ffc84
SHA25600e8847e4245cca667ac036bf194cb2291e03c54341aac6e49ff3161086915de
SHA512d4a1b7f65ced35dfdd231226cedeb8cf127ad0aa7319300c50868eb43af5c6a680d4fc8a0850e612f4d18a358a0cf6ef4ddbcee3b48177d2f91460fe9196fac4
-
Filesize
2KB
MD51ea300bf99ed6948ec24d684d6f28e80
SHA1655a0b3f76b2c3be13f4dcabceee7d52664579f6
SHA2569e42217c057c28ddbb7a70018842988c2032adb85f3c3ccd2ca61a94a9cd094b
SHA5121ded83dfd487e22adc308e75d0ab39db7e6b47ebd281b8a3eb396097c6eb166fff9adea3e968fdbfec5b38cb17b7b6c0bc740a0b09ea5fc9835ff53e31f36215
-
Filesize
2KB
MD5d0317558143255a041b071758f44fded
SHA14ac412ec9aade09389506613acf616cc141dfa26
SHA25687b1eb4a3b6dd9fad0b6f41de6749fd48624dd49257e4d11cc8b5758aa1b9884
SHA512177986ea2b91afb72cec2882f5ffc11e20a9c8a66e6afafd87007b5f847b09bedb0f7412d4c3d7f842c791d0872f4d0b48a08e0a8ba5d797c311a7d2de7fab13
-
Filesize
5KB
MD5ec4a3fd041b105d3e633931ea8723c69
SHA1b829c047ab770adeefe24e3424d91df2f3cfea85
SHA256dc918f11f82d1536ea46911365d801f0829013a045f7c8bd67f62c4b901a5900
SHA5128b19fa3c42330c50a07db6cbce40d13a27fbdfef59589a2125636d38aebaf97102210f768100bd47ca5961abb45620bc07f87dee753fdcafcb51688914d8dc7f
-
Filesize
7KB
MD50451cf8772ba4ad6db8acdc37d4a03a4
SHA13457de3d754cd0986389fdedc20f2d6ecc11d723
SHA256d5149557b76986526c60b0cbcc6608c58ff582674451adfff0d62e3c459c7a72
SHA5120f643c100997f5946695540eb4334b9bf8810929c2008f2b4ff5bcd6b7b84ecc79797c00cea30035e02b0b591f0c753c249001073455f95320c3381c4dd1e09a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d3a2f9046162866293fc4901ae6cde75
SHA1be7cbc1a44f7603be489b28414e063fa201f1a64
SHA2561b693b305934aec39edee8dda2edaf5fa7c7ff721aa168dae14b7ad9a0649d7a
SHA51242f6380f97cce1e701e28cf8b64f71c8ba15a8bc184896e7f50bcfd0e10e246492e31ef4dd09f7c62a0c02ec59d378f56c134fd5e837d11f60efb21225cbf3b7