Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
d9c0d5dbf18b899f81446977b9baf74b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9c0d5dbf18b899f81446977b9baf74b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9c0d5dbf18b899f81446977b9baf74b_JaffaCakes118.html
-
Size
82KB
-
MD5
d9c0d5dbf18b899f81446977b9baf74b
-
SHA1
b9bf5336f08589ff693e441297ab5072719bada2
-
SHA256
5f240ac3273690cf41b41e68e7e3f080979b83f43a605f6503b058d0a207b038
-
SHA512
166fc981f8a4f32b4a0efcf40723fabc643a83f862dbff2ab4d5034eda9f7482ee5851451d31660fcd824db972d2ef7cc0c1018a9ec395c6a1a7d50853c19ad8
-
SSDEEP
1536:epPMlbN6FJbTM7NbUfxt3lSWE5/ezOlSYqKyM4WvsUWZkojNqZnR0pD:epPMlbN+bTM7NbUJBE5/ezOlSs0UC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 2248 msedge.exe 2248 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 2312 identity_helper.exe 2312 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3528 2248 msedge.exe 84 PID 2248 wrote to memory of 3528 2248 msedge.exe 84 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 1188 2248 msedge.exe 85 PID 2248 wrote to memory of 4152 2248 msedge.exe 86 PID 2248 wrote to memory of 4152 2248 msedge.exe 86 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87 PID 2248 wrote to memory of 2152 2248 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d9c0d5dbf18b899f81446977b9baf74b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9657b46f8,0x7ff9657b4708,0x7ff9657b47182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2156 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11118328643067257609,3796113294331965508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD52e2241787ce271367f93b8dcd975e984
SHA17e9c386b9f2e993d99c5a9fa7f3195caa0671619
SHA256188a5dec3717bd950038217d6e5e302586c4cc9d158d65c263b5f05392fa3d6b
SHA51219ef1b330830eb36753ac0ad067fa473c8ef564ac33b052f420faa83d932f252d14b41518d62d4ef1bbfe85f4aac169d8846ea344b11a68c62c2e363b6224016
-
Filesize
755B
MD53845cee815cc67772d794c7129d15df8
SHA1fd102207d810c05ee03a4500f3565ff613ba8065
SHA256428bae086da4190cfc8ac88a809ae80746a8d343fa72d780927e7edd9a2f159d
SHA51232d24ecbe6cf886e65318dd21af9074296f5a91e4230aecd27ac87790c9733b8d531c41eb528e1f1e8b70e360dfeee689485a42be8d2d193c89a6f6eae52c5f4
-
Filesize
6KB
MD5468c85ab2c502125824c283b949ee99b
SHA122d3c7fc0ffe57df58ea3574844346cf691755d6
SHA2569350f027e09f935b702d35b8a63bdc5bf1a5a890ac378448048923a511764a3c
SHA512ec4990be70618494124a32af4a1fa80a16ad6ea1ab09d41f6acce916f6e3de4de9093216df528df499093976eec027945b4dcce8dcfbcec589f64fb8fb64e321
-
Filesize
6KB
MD597cac6012b4ba124e187bbb4c73295e0
SHA12b6fd0a860140aeadfa833c7723229c2796e6ce1
SHA256b8de9dcb22ebba7926181040af75a4ba4be08514d86210876a356adc672e8766
SHA512acbddb19bd7f6e90b8aab142a35858b346fd8afbfe62f1fdd082fd51e715c45e70b62671b0780121acb7853c42fb4cdd4f58704fa56e69d21b5cb50de59f6346
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\edafed05-ea6f-49c8-b395-c036065a00ef.tmp
Filesize5KB
MD58f8a20e14e501cc203ba9c576995a85b
SHA1cad1f1828bd3673f565e1310f94d7ac60a40f682
SHA2567bc11b2f2d91d33a19041896f7d4c3ec41c50a415b3e4933ca7d0e9790743b27
SHA5122f80bcd68c208a7340aec29ef0611ba0a0ea50c1e94b057be157d22514bcc7a6163ff109edede06675033de0c4af59fdf78fc7ac0fede917304d4ade09d482d0
-
Filesize
10KB
MD5aee4e5ecbb8201ae3ff31114dc8faa5a
SHA16fb922b8bc29950d72f3593a0f15e6c10d46da6f
SHA256fafdb40e44c97e22f997854085d4a422f5a1856bcf36327d36d2197b52032214
SHA512452557044855515b7c793755d5bc121d1144223268186113cd41efd1418cbee4373a96f4c3fd64cba076b5a8fcbd5d543dc51e3fbcd95de137d49f995cca9054