Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
dfc0d9e91d70d68fe7154218558b0337_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfc0d9e91d70d68fe7154218558b0337_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfc0d9e91d70d68fe7154218558b0337_JaffaCakes118.html
-
Size
77KB
-
MD5
dfc0d9e91d70d68fe7154218558b0337
-
SHA1
ff05e9c32a1568abce02689cf18e3695c782ef8e
-
SHA256
8388862251fcf8f4cefdfe02c471d73cb8a2d32e8c725af35f3ddac24c24fd69
-
SHA512
fe93d7dda3c7bef9e7636c9a11df9e0f3d687c2724abce49eb07709e6df00aa908651b71be3d4154b4e2b8f33f400a1e94fe64b4db5edfae4027feb5713b9e7c
-
SSDEEP
768:1/5oB571fyUV51phVhgqMmB9PsYPjP9wmRMQAoKQP5qQLH1elM6uUi+nL65ilOL2:x5m5B6Uv1pHhgqVn7wyxsQzPUdGUO4ZR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 4600 msedge.exe 4600 msedge.exe 1624 identity_helper.exe 1624 identity_helper.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 956 4600 msedge.exe 83 PID 4600 wrote to memory of 956 4600 msedge.exe 83 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 932 4600 msedge.exe 84 PID 4600 wrote to memory of 3748 4600 msedge.exe 85 PID 4600 wrote to memory of 3748 4600 msedge.exe 85 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86 PID 4600 wrote to memory of 748 4600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dfc0d9e91d70d68fe7154218558b0337_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0dc446f8,0x7fff0dc44708,0x7fff0dc447182⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12181447641599393652,8788869974680829545,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD57f40cb3dcc42a5ce6d2c7e7037115805
SHA141f65182ef04ecdadf5f65fd87a8a98014962c88
SHA25621ba6e403d0a0176a02b45645f5d1c85b2fc60969fe3b5af6bb1df998dc61d00
SHA512b55f3a4284ec90747fd4ee07e011eb7a588ba7036ba7a017df51f39c7aa41760ab234386388290001f4e7e4576a312163640da625d61a3c81585258df6a2edbc
-
Filesize
1KB
MD5700b6d8274a5f590cf093f3f64243a07
SHA1d72813ce1bdf743ae5a9c8e1d40171e58a44856a
SHA256245bd2c29e49ef4cc596572700290a66b7e928031dbe4ab04a2a38eb9e726bbc
SHA5125e2471c521185215d4f0e51411da763b698a014a87cde7b5f0606bbd41fe903acdb7cac9f638e4e4b6630f41fce49226784ce298bd89c18e9eefe2abe8533eb6
-
Filesize
5KB
MD5f0c4348c5c884397a833d333fe6f02a5
SHA15242fc48d023c39f1fe5d0f841b42cbee4a2828b
SHA256e8b5bc0a29f84ce8e5646bae936d4adddf6dce7d728a9d3f0b03dcefe0fa7e25
SHA512627156796396e5b5969b8de48d17c05e681b261f995c820c386b7c2de0aa11f5c3f4e4a7ba27eea13c3d48e1a6762b8cd2ba934cf343200144f58ca62112245b
-
Filesize
7KB
MD5a75429e171c074fb15aa4bd16202d9fb
SHA16bbba79d8214686866757f7b1a2d3fb533b5950b
SHA2569cbe506270323dd56680cb859fae728dd323c47c3814a5928b215401b80b7870
SHA5123db81b0ccb4f68d213008de9bc519267c2a449d1b43a72b29c6e8ec2434f7ed1fd01c3b0f2de9947b9085e06af71a50a53bcd158c01b7556093d59866c705489
-
Filesize
1KB
MD51f1e7cfeb24eb7b3976c2123c1a79abf
SHA13121596072c20d740c0ed02d193d25dc1c5f45ca
SHA256d4b3c19748b20da7e3efa018aa754a3ce1efe535b2a60198d0855da0548080e7
SHA5120dba8c99e01a6b05792107e1da3f06dcc0a7ddc6582a08a768cc298fdd8a3dfb56db3a46a92566586c237d0e6cf0585c964d47cfe27994a03c0347338f4d9bf9
-
Filesize
1KB
MD52d3a0ee077f5f5fb153d8a325d299f9e
SHA13322a5d3e39eefd3d195c1236a5a4397d7d65293
SHA256e5a5e0c9b5ac67e3c033067b4ecf198010ddd83ec476cedc4449c7dad1f26814
SHA512d32576357bb2194d4d002d736f2c39b4b63ceb51b61d3b7dcebb5a5ff8a2d7ea249af4a3c05a211426c4cb5353fab84ab0e3c543b71d997a02313cfe566050ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58cc46b9febb80d911a72e4552151483f
SHA11d532c17bc2ef5c474b02de4df86e90cfa2c7286
SHA256e074dfd952bb565174aaf490547a20bd03b11b09cfcef4e0ef3191e778b84c48
SHA5120ce4158d696d42cb3dcf8bdce1088c094489e2b958d70cc6435d57001722bf6b91d50944201b86183f438b97aa826f796934cfa35888455cd9cea791276f17f7