Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
dcfc1957b686f6bc37f45fdfb813e632_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcfc1957b686f6bc37f45fdfb813e632_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcfc1957b686f6bc37f45fdfb813e632_JaffaCakes118.html
-
Size
150KB
-
MD5
dcfc1957b686f6bc37f45fdfb813e632
-
SHA1
54f08352158295bc837b3134372df8776cfaad23
-
SHA256
9739f77f43a25b3b22ae72c0d6795a7d42d9575f0d38c6fe1b3b363c233fd3f1
-
SHA512
aecdeff22ab8e1a7ce7487cae4ab9e352527d42b0978fd5bf757b3a67728b5b6a7e73f71251a9d47760d32153479185f44047d4d177966c461c6d66c85a7f330
-
SSDEEP
1536:HIF0B7lKQIGQ6zE4K/FKPD1oNvoqsw1EY2Kgr8Ri0dYqKAm80D6Ky/vEVtiroKNB:HMnj48g800M8Bzbtgkr1P/3YYx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 3708 msedge.exe 3708 msedge.exe 3980 identity_helper.exe 3980 identity_helper.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3616 3708 msedge.exe 86 PID 3708 wrote to memory of 3616 3708 msedge.exe 86 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 2228 3708 msedge.exe 87 PID 3708 wrote to memory of 4896 3708 msedge.exe 88 PID 3708 wrote to memory of 4896 3708 msedge.exe 88 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89 PID 3708 wrote to memory of 4480 3708 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dcfc1957b686f6bc37f45fdfb813e632_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2294118311968846388,4104608787287884267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD58a84192eeb6e5d3994bbea51922f35b7
SHA1cb489d07aaf598fc394587b4964e98c9ed584a21
SHA256883562f6bfe5b55b4e121efa4ac5b9e1e534e8a96276a648ef248064c303a2c6
SHA5128bfbde01665aa94901253cdcad3f62fd6075ca9f07549774919d38709b30021650d72bd36923cabd1210322e9ade12ca20be33848f6fa74e9a899b735b7f3d09
-
Filesize
2KB
MD5ed0e99cc480aa283c3bfc876ac00e2e7
SHA10fc1d3c3ac6a11b2bd4b239075f1727fb3a8980d
SHA256e52fe7ab5504948ecc35616621173a5230874a2784b84d5131c0b674f77a56d5
SHA5127db50bf90630a4028cd20c1fda198ead509b91109162d80290f82308fda698d5c2de3f5db905ad55333ae7057bb4c8906182ee74bb3985a175102f6335c68e79
-
Filesize
5KB
MD5e34844f8b56c2ce814d12b26e6be4bd3
SHA1fdbc221d40be6398192866b25a529788b087e941
SHA25635c19c4112ae943afddf2eab492cda5a87d4c1d7933f61f8e5755cfb08c95172
SHA5122ca0de987e377dbb7f6528b00e9d466c2e5da0818f9703ea48f14fa5b926f9e31944ced4bb3858630c1637703ff0598f7e74a27f466522d524ffbf19d1e5aeef
-
Filesize
6KB
MD576010a37886a06c41064e172580783e7
SHA1da6c81d9d67c4f037da2d27f3db34b41a4760d36
SHA2567eb5c05920fda9be7f58c96308a20d879cb6898731e592bc4f74bf523b44cd7f
SHA5121d67a52d203b62560d74c81dc977d02e5ab3b970e75e1566adcfcbdfddbd411e6bd1ad4d3ca1b0c87115ed16f6f9a89deaf73c41bf81d5b85f71b0383eaa19b7
-
Filesize
5KB
MD5df641ff0f4cdb768cbf4b451a0758481
SHA1a91403dd8c2b7b0c76d08e8c053659ab25089ef0
SHA2560309f7876b20d4726bf64fe99875106c735caf0969bb579b3fb1240f0fde6cab
SHA5127ac8e94724a6f72e2785c9b9ee635508b2abaa659d61e3c95c55db09648ac6990763b3632046ca14905276ea95592d1ddc82c8dd7b3ec981114beed1e7aeb823
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5edff6f47c53cfc47eb92ef15634254cd
SHA13322828325465e871d183cf410f5b588dac3b704
SHA256326b188001d28cb2335505f1d98d56cbd843c73fcf4c65d6caaee3cdfc905eb9
SHA512229da4321c9a81a9c8dbd8fee30bf1fa23f6a72e2bf31add0ef6590eb7acc218c9209eb71423d7bfa680ccfa8addaa601001de15f0ebb21da1a3467f7f27caba