Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
d5eb5074eea5ad6fe7895d98e0f43c8f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5eb5074eea5ad6fe7895d98e0f43c8f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5eb5074eea5ad6fe7895d98e0f43c8f_JaffaCakes118.html
-
Size
126KB
-
MD5
d5eb5074eea5ad6fe7895d98e0f43c8f
-
SHA1
4e4b195cea6af9292a75ab77d8825fce67f4bff3
-
SHA256
2af59bafd64819cc89191e877db9185f7156e03cdc5adf30f1e3ce79c711bb39
-
SHA512
a3c1718b86b87e8e091e4f7894784259912dd1cd4376bd16ad65745e5f9229eef9a137a82ec1c40bcb783e801c2d4469502924244eb6f89d715ee22060da5074
-
SSDEEP
1536:8xsejacfHsrrDJNYh8JxYx9XG+6Fm/rWHTeKwWfRd+cSsOqCYjj/Nt4c:x9NY2ojXGFMdKwCd+cFVjj/Nt4c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2788 msedge.exe 2788 msedge.exe 3496 msedge.exe 3496 msedge.exe 4740 identity_helper.exe 4740 identity_helper.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 1496 3496 msedge.exe 84 PID 3496 wrote to memory of 1496 3496 msedge.exe 84 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 1000 3496 msedge.exe 85 PID 3496 wrote to memory of 2788 3496 msedge.exe 86 PID 3496 wrote to memory of 2788 3496 msedge.exe 86 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87 PID 3496 wrote to memory of 4024 3496 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5eb5074eea5ad6fe7895d98e0f43c8f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae52946f8,0x7ffae5294708,0x7ffae52947182⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12510997748912554521,4911785947268025103,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5688c0b03c6686218c49d07c393bd07ae
SHA1eb72d16ef0cfa094acd0851def085cdd06fa399d
SHA25676febfbcc318198df96561de17f7867065a27a8ae036d5e6ba86d971b072916a
SHA5123b7ab0def9a88acc0f09ccf2189ed0087d7a40553e2b852d84e1f56283002762fe2df6620a45f9bee265672736acd2654e026cf555d7b1b7000710e22293ba69
-
Filesize
2KB
MD50b27877d4e3999b9f36639a556418072
SHA1ef07d57c74ebddd833398d2a6552af908c8132a1
SHA2564e9e78604cea7cbbc0ed10e0a1a0ae8d29dc82c78f71d6ca5c7e95820845e6ad
SHA512c34d22b717d0896a53d0a4b8478d07ebcb8b2a1d4c6702e9280cbfb58e5add2e504b32f5d1563ed605b03875e67ecff1f0a53869769e429dda996558198ba26f
-
Filesize
5KB
MD51f8d9d1ed2e541faa166067b04899945
SHA1189ea5a57c926a1f0d173c4335acaa0bdfbafeba
SHA256a42c3e1a482a19435feacb924a480554390052d906bc01171f0b170925813e62
SHA512f6c558c2dca9e65042c7e64e3cc5fea17c2e76d9f7e1d0a682b0ae728340b84f73b5d86fe11f9e648ec5743c4c086bb473443e3fe89d7b66b96ea4e2d5767aa1
-
Filesize
7KB
MD549311538dbeda6d588b5b337428feb11
SHA1e435ca4a2f40261b16e389c8c935cd4f87fee37e
SHA25654355b0aca458844ac96c3c0768a10e4127a8fe87651fb5b52c9881bdb90bd93
SHA5124cfeffbf9a6c1a6831bf312c8aaab005acd6c113425d8aca7952a4b106319dbe657f1a14587189bd50502cbd3765a45470b8f58973f5fc75719309ae658e0424
-
Filesize
6KB
MD541a5c2df0d41482326047521a525749f
SHA13a7df667c714b14b0977b6ec15e63a5e76ef20a7
SHA256ca249757746a5b97f00c2295aa27fffae9975228ca443ff4ce32e331ff7df03a
SHA512cef4ea5b5f48b3525a40740c03e32e2348f9c1fbf2ea0489480d632d41b2c3fb8e4632e49c35daa1138e3f8f7a50d68b5ad80b35d8c365ecc234144fcd71c715
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55906377562f9b3aa0f5dd856a323a211
SHA1c5850778979cc7c917da8a333670097f1903526f
SHA2562202b15ecb8c8ed2220bb156d7a547e6851da2dd028b7087b74a05a919328b28
SHA512efd76352aef8c68b7b4222e8a328b7a1b49968f215142784ab907a596294e28897ba6c3c4a43bb54f8bd239304505c3dbf94b2bfd881f41277abb23e12ef6ed5