Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
d7415dd56a89ea48400ec576895b3d2e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7415dd56a89ea48400ec576895b3d2e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d7415dd56a89ea48400ec576895b3d2e_JaffaCakes118.html
-
Size
57KB
-
MD5
d7415dd56a89ea48400ec576895b3d2e
-
SHA1
b1c5262ccbe042bb2ffe23119f5038bfb969f3cc
-
SHA256
2fa3789bf0531d8c45a48f91105a52f5f7c654972c39a61c779d916ba791e497
-
SHA512
d6562a0d0cf2855bf63cbc53bc133bc233d8c046b0c05ae3ada21dc8bb3b72c2b19eec5a9e3fed35cb1a84f94b0a7195c2caffbbccaa24c0480b17675b2e71ac
-
SSDEEP
1536:ijEQvK8OPHdVg9o2vgyHJv0owbd6zKD6CDK2RVrozLwpDK2RVy:ijnOPHdVr2vgyHJutDK2RVrozLwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 2064 msedge.exe 2064 msedge.exe 3680 identity_helper.exe 3680 identity_helper.exe 5996 msedge.exe 5996 msedge.exe 5996 msedge.exe 5996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3816 2064 msedge.exe 83 PID 2064 wrote to memory of 3816 2064 msedge.exe 83 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 3492 2064 msedge.exe 84 PID 2064 wrote to memory of 4136 2064 msedge.exe 85 PID 2064 wrote to memory of 4136 2064 msedge.exe 85 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86 PID 2064 wrote to memory of 4140 2064 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d7415dd56a89ea48400ec576895b3d2e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1fdd46f8,0x7ffa1fdd4708,0x7ffa1fdd47182⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17963391390405242385,12580707185811331304,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD53db9b134e49940a2c90472fb57bb98ea
SHA1435c71251e95993fc4611d5bc3bd593dc45c2054
SHA25684613aec2b8776d0aa00d9fc4b797a13296f21d768b1496d1e29d2479ba4685f
SHA5120b83c460ae4a31e57d7ca19b888fbb4a4e19b669e886cc0f4bea573f94240ba7e8f2cffe1a74c39a2a7ccbabe77efa4b8c6a72f178196f72d43900235a1749ef
-
Filesize
1KB
MD5438336a1626a542354afac68a731c1cf
SHA1b5d34b00b757ce6d42f1c8dbf4a4f11f56567a95
SHA256ce4df6dbec2d6b4ecc06280a87d12127af319268fc909131828ffad8ccad0cae
SHA512624d874bf8db9736e735dab92f78b3526e173282a92adcc5fdcb941da68f05216709c4cf921a444302526766a73d8e487eb92568bf5a6c05cc7bb1b34bbf8cbb
-
Filesize
5KB
MD503f41ba6f8197372ff12b1e7d85bb109
SHA16c1d1da6866c581a29466dfcd983fbd6ded75148
SHA25606317221447dd5af019fa7691dc396e83de8e86706d364e807ec84516d97d53b
SHA51265c3468f7448d38d65a99dd7bcb406137ed1e2f6a51dadd77d1b9b13adc9c1b165404adad0e37886fbe77a5c85ae80bb5a79f506082a9adf6543901e3b8bea27
-
Filesize
6KB
MD5ef7e33fe35be0446e33e01a78b04438f
SHA1538fd25cc0ad142c54f4b379d5cecc8963626377
SHA256b79f1e9e12b969b1e77d8cbf4d44e6a45465bea84be337c62b342e667cd9b2e2
SHA512fadd18b046c30e854ae000853c3a9486ec3ca5e526151c0f564b48b5e5f7bbaeda2e4613b16ceeab8aa451ed0612d2a56402f50185861ab76cadfd52485fe214
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582df0897096acf7845ff4145e2047eac
SHA10034f26b10f6d6aaebb8c86bf4d14246cabb0e90
SHA2562aae634481448db12c4369223999c666f0c3647b1d84a48765acfbdb0bfc912d
SHA5124c8fadca4a1b98b5e0408ca35ad72cb9481f0d9f18badb00980fb6d78193b43a8b2c0a489d1b56aa7775c3c0b1ae4399a072901d1802f9a00c529aa3978870e4