Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
dca8d05f2710448c9f57d12cb18e22e5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dca8d05f2710448c9f57d12cb18e22e5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dca8d05f2710448c9f57d12cb18e22e5_JaffaCakes118.html
-
Size
175KB
-
MD5
dca8d05f2710448c9f57d12cb18e22e5
-
SHA1
d0cb6f300d218d378e559c9eded0f536958d44b4
-
SHA256
a82880cda239f4c08a7355cf007d66eeed9edf686aef201002651651d1c18f75
-
SHA512
c0d2532eb495f9ca2c0f5bb289d51e67123c228a8ed95708cdd1b4604b6cad66d48c9bc361093f9e2391188f63906f3b60d92c2b3053a251f1f8a4448c817c4b
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3yGNkFvYfBCJiZV+aeTH+WK/Lf1/hpnVSV:S9CT3y/FOBCJiYB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 400 msedge.exe 400 msedge.exe 1360 identity_helper.exe 1360 identity_helper.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 3888 400 msedge.exe 83 PID 400 wrote to memory of 3888 400 msedge.exe 83 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 3076 400 msedge.exe 84 PID 400 wrote to memory of 2340 400 msedge.exe 85 PID 400 wrote to memory of 2340 400 msedge.exe 85 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86 PID 400 wrote to memory of 1064 400 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dca8d05f2710448c9f57d12cb18e22e5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc437c46f8,0x7ffc437c4708,0x7ffc437c47182⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,17972014577616148717,8650013480056614250,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD59722bc6e1a02dba2c3b0e87715a99827
SHA1fbf6494dfc885a5e042f5695cf3997b7b4151ea2
SHA2562d1632c561b1df24259b88f21fcd4f3b7daeca31154b7fe6a08f406aa8e772e4
SHA512a2514bc0105dc0bd4140e5199a04829cc466166959b1f0f4009755da78de06b5dad114495fad46058861672d1fefde9a9c9c99fe392e913f88181a77f8b05e28
-
Filesize
2KB
MD543becd7fe353c077a8365a5121d5e38e
SHA1d69f671a7482319fa0ae397e40790c7151f64e30
SHA25603adabca68b7e71b41749a3ef06c39c6b29e1cf9bd964b6ef9357375cd28c022
SHA512c311f9d500f4e7b24cfda7f2e57048f4da4863b9eaf89fb7ae62adb68e27723153a83964990637bff173b3927f703b2761d2ca572a9c58c4b9ab9d060e6c07b1
-
Filesize
2KB
MD545d58ea5a33496ec78a4f93dc1de737b
SHA10f603d95af273823d7eb1884a101508b1848ea09
SHA256ebcfff7de0a2c7b32f58e6b7c501c0932400f5cf018abb4c7c9afb27c5a08514
SHA512f4697c0b8545dfea172b3d18cdc040d5e7a0e15c3708ca2a89a9c9ede453087935a91a77424a1a4955254d8d46b3328940e9db5d04a90198cb7c8d0d1d58254e
-
Filesize
7KB
MD518d87ba32eecb8c3d5bf99f591464a59
SHA13707069201eb5d80f2f36bd5d511c6c8a3b03a72
SHA256833ca8183ababe181c9f1896140c55be24756c30650832939656f515c91c211a
SHA512a9a9c4db563e16179cfcd2c37ac0d10fbc20af15d079da6c80a8d7b7c27edcd91b95b8c16f84a38d6fc659e639828e358b335a1e1f0a77c7e9649bb8a04edf85
-
Filesize
5KB
MD50797f96c755d8e3d99968f6ba61ef6f1
SHA19b2a304bea1e02edbecbefa0b0cde1908df46d13
SHA25612cc902b6dcd1687497ea75cbe6ab23eef493497a182f22acc425fc07cfb3809
SHA5129072caa75e49e8550fd0d8158f31af87584761397b75970874a8ff5e7e11ed87669bbb258a388fa4014b149f23a4e9717b2986762cbb269a5788ec6be1e87184
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5392e872063973e124b108629dbe11c32
SHA1122f4f2e12dfcff78631c5edc9e9eda932ba54cf
SHA2564915aaef70d6ba20cbfcf6e90b507fcf2696a6f1213a2bfa0243c3e3ecc36443
SHA512562968307d5e8866fc585156fc9f100b7c3a7373f9bd97ca194e28d60b8ebb7363297d49d3e0fd669e3b916902062df09692871166730cff3f5d1629bbc6677d