Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
dd74865017f0d154f037fb63ed195d95_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd74865017f0d154f037fb63ed195d95_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd74865017f0d154f037fb63ed195d95_JaffaCakes118.html
-
Size
131KB
-
MD5
dd74865017f0d154f037fb63ed195d95
-
SHA1
e8ab067541a76a90cb72722fd6d1c8ff2ad07aca
-
SHA256
0d5080df61f4e72504283ca37d0c92f8eb9aea9568c1280f31dfa4182ac8f307
-
SHA512
6818b3c753f07bb47814e9f70291447721e33ce4c5f50e46ad370ac15a7eab216e1bc0b101eb8ad2956b7e81696b5592afc1307546c4643953712b76154907fc
-
SSDEEP
1536:FHXHEHT17To0FRroXlWNKvvN+B3OsDONoPJ5+WG9iONoPJ5+LzowoRZb:FHXHqbRrJONdWGTdL8woRZb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2792 msedge.exe 2792 msedge.exe 3116 msedge.exe 3116 msedge.exe 2224 identity_helper.exe 2224 identity_helper.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe 232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 1068 3116 msedge.exe 83 PID 3116 wrote to memory of 1068 3116 msedge.exe 83 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 1492 3116 msedge.exe 84 PID 3116 wrote to memory of 2792 3116 msedge.exe 85 PID 3116 wrote to memory of 2792 3116 msedge.exe 85 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86 PID 3116 wrote to memory of 3120 3116 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd74865017f0d154f037fb63ed195d95_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34c46f8,0x7ffcb34c4708,0x7ffcb34c47182⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5814536179031123150,4638065697640070944,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD57606d5080c2322880123f03674201cad
SHA1ec0f0df594eaaedfb657c5cfe00f78600c48ac8d
SHA2560f54482a29b18f5410275c910a4a813cb2d49097a0370bb7d669213f28e95de4
SHA51252a111f538428c0dc4ca886692e428fd85724ebe06c5a87b32a89b82bbd42272b18879d1a93a06f58af022fc014b4f6747d60e6c49bec868f37557a6892a47df
-
Filesize
2KB
MD517e49094b2f9923eb090cdb1bd10121e
SHA14cf5d54a997c5d29e8acb4b9579517329e6e449e
SHA256c36b92c68d31572f46ed3ca5272f1877eb084342d81705043090c2d3093ff3f1
SHA512ef944db6279524ccff3d6fca63f8af04fe0ca5813e7b99d147d1af962f345faea3a175c4fed236b1a5e3e65bbfe829e4b225d05164d68782027689a20bfc1bc0
-
Filesize
5KB
MD5dc264d9c4ca4e95b562e104be34189c4
SHA1dd5c8a59718e22583c4f320bcb7936049f1406cd
SHA256bc885ee98be285d506d6c4bdb0abfd786da33a200e1a9f4afbf69a10d16d326d
SHA512d0fa24b2996740dc145e671a9157e83a5e3e211d38365d2e31b04231ea69d2303fe1c8e2867159cb95f0b81076d2b7ad4616d2a39de9e8bdf83f64d6ad599432
-
Filesize
6KB
MD55a1f2acf9314b885c0c6a67b402deb00
SHA1fa431aad0323f0bbb1c83765d61891a813dde8e6
SHA256f42ff7ceb875764ac5eefe46c4ab4391f23fa707fbf906ac3106247a042a831e
SHA512da3deddec24afe12593b4d8321f539e7141a03d7dd6677c4a1199a9740c0401e3076d0e179ef7e57d73a0396ac712c3b1f5b006243ccceafd71482b4b95b8fd6
-
Filesize
6KB
MD5ab06ea58cad434e5fd60351e6b1080e8
SHA14ef38012fbbef7b73223e2697ec6293dcaeea026
SHA256ac85902b4bb2cd56bd09be47e120ec271447667be26a80212edc68aaa92be75a
SHA512a0e9b210858e29f638584d2b6f1cb35fe837cdad0c9d7cfcdf60c29499de122f0e52a9490b7d4b8b498f36cbe10cb1fb608517a569323721aa8f542dcd38353f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f2e86d35eebed68912835d9253a7b691
SHA1f739eddacbcfcfcd55919e03d0b9631636fdbe54
SHA256f81f6de2c27be35a308694a1a1b6d493c39edc6acec949ac387737575bf0c77c
SHA51270beb499b1d860cbf3e195e9f5c6764b5cb7bcab28c8a4112e1075138a9675fb1d76a5a5f86ec33af6e4d91b636dae3fb75d817dc882d91979f421cf628e1162