Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
d5c39e0f87b67a6de3ad8655957a3ac3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5c39e0f87b67a6de3ad8655957a3ac3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5c39e0f87b67a6de3ad8655957a3ac3_JaffaCakes118.html
-
Size
90KB
-
MD5
d5c39e0f87b67a6de3ad8655957a3ac3
-
SHA1
e15a09f375a0fafa407cf1fd0af24c8db5c4639d
-
SHA256
b2cb10ef36666a9aded2768d6870780f6b5a0a3ed686fa9eb064e568ad0e134d
-
SHA512
441d48025c501aa06492681fe7f59634c6b99b93a1a49d6ea8f7ecc16c65dc4b138b0042a71b4900868279fb0247084ffa8edf50e3791ec90f1bb7f50d51d1cb
-
SSDEEP
1536:0MuwMF3nRUUETwApawo41ZVDJ1aae3Yj0grfnzurtAdW:0wCRUUEPpaAcanj0grfnzurtAdW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 636 msedge.exe 636 msedge.exe 2144 msedge.exe 2144 msedge.exe 2560 identity_helper.exe 2560 identity_helper.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3380 2144 msedge.exe 83 PID 2144 wrote to memory of 3380 2144 msedge.exe 83 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 3068 2144 msedge.exe 84 PID 2144 wrote to memory of 636 2144 msedge.exe 85 PID 2144 wrote to memory of 636 2144 msedge.exe 85 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86 PID 2144 wrote to memory of 752 2144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5c39e0f87b67a6de3ad8655957a3ac3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabc4646f8,0x7ffabc464708,0x7ffabc4647182⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1892 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,18124386435879218646,11277639212457909595,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD548518768a8186d5de3f9ce0b43dcb370
SHA13c435721a838acb228824fdc514f98684bda8a4f
SHA25670f2f68093dad7c3aed923f77147d58228ee4b13c1b9e1e96450e5a20da8cf48
SHA512d067239bc940a9772e9c356ce65f073837e2db2483030800d0fa3913a12c46ca6af201c084f00099d98e3e0cb5b2da9561ad67d2330980d872cb9a0b901fcd38
-
Filesize
3KB
MD53487d6caab5581aa62d6a407469e731d
SHA1009ef3e7b691ae6968784905e62ceef2497eb577
SHA25623118b46e05d4363d18fdac1ff468df1f7b1ff83b07d53355bf044749434ab16
SHA5122fab33c0d8763872888c64816b6571782fa58c4d350ca63176f98583e4137caf7992218df3597a44464f1dee513b7a5cbcc1000cd2ff24d1b4349beea2a421e5
-
Filesize
5KB
MD55d5e6ff2b88796ce8d13fa3b43359b52
SHA159cd584c10d071741a1d9f4d90e416a2d2b2cb88
SHA256eb6c1500bad35c9b0ed07806ca2ec83c66ffbd91eeea2b783bfa1352df6f10f3
SHA512da6aedb2dffc5c635d1cf20f8cf49e80c48575e32f9cf41f6e8ab2c161cb9168920f0e1b60c8de6d89572dd0ace03e7046417ba278ec6360eb4a4afe464dd19b
-
Filesize
7KB
MD5d8b82de423203e582decd61d9630abf9
SHA1e2d01689f7d8178d5383539edc007335c6810d9a
SHA256ce332e7977f4f9f6799f5316d1182a613c5166f7642f2f0815d358bb4d177593
SHA51263c1296336ab87709ee6fe427cc917647b02fd794ec927f5ace0487d4d90c0fb337c521a1d25556ffb815ead11319d10a9ee55022f4708f396bf27aa21ea6ecc
-
Filesize
6KB
MD5a2376a664599c183940c3b2655d8ff9c
SHA1ca91028de6208eb3d104851538a5247d9f5f5fff
SHA256fce7913f8027c8a46744fc03c978daf988c9e856ef2da9ac549c3a1641f02202
SHA512ddd1031145305c34915f01a59a4dede79cf6143fb844aa5576432e010a405b44ffe1304912c2a611068791d2d54c767de1de0f0a88c7d02a9d535c1d76b35afa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f1d431c948f476cd7e2fcf82f4c28d33
SHA160206ac65817a4234a9d1cca9101e12f8b5984b2
SHA2563a730cbb8718eb0be04323a3798b5de1c62bed3fa5844390fa516662aeb09813
SHA512649ba246324be05728d3b6b60a22edfcf1b87d1c54f5cbbe4ab4bd930e0523aa81cf1026e710a2081852419dd7fa02af1507fcec7ea8427b2071ff5e78622c2c