Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
dffe81f472c60e9beaa7b3b532cf2145_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dffe81f472c60e9beaa7b3b532cf2145_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dffe81f472c60e9beaa7b3b532cf2145_JaffaCakes118.html
-
Size
57KB
-
MD5
dffe81f472c60e9beaa7b3b532cf2145
-
SHA1
227b34087a0de11c2908562532452795942d5e0a
-
SHA256
96bdfeb47f36c978d90890eea51c370feac80e1613611b2a5d45ba45e9d88b87
-
SHA512
9b07a13ea5d038046319542bf54a1fdb8764f07310590e3219178c3fbb579314866b4d2944dbbcc3f9917d29c11f172aca8fbb8eb51f0e86d18b0dae11129f19
-
SSDEEP
1536:gQZBCCOdi0IxCOpXRf0fVflfOfQfYfefvfofFfgfufHf7fCfjfxfOf5fPfxfkfle:gk2w0IxbsNN2Yg2XQNYWvDKrpWBn5sde
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3112 msedge.exe 3112 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 1996 3112 msedge.exe 83 PID 3112 wrote to memory of 1996 3112 msedge.exe 83 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 2704 3112 msedge.exe 84 PID 3112 wrote to memory of 3420 3112 msedge.exe 85 PID 3112 wrote to memory of 3420 3112 msedge.exe 85 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86 PID 3112 wrote to memory of 4424 3112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dffe81f472c60e9beaa7b3b532cf2145_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1d7346f8,0x7ffa1d734708,0x7ffa1d7347182⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,1080031468714888936,4556936841186690566,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5fc06966bb27f916e02fc398bff1e4e5f
SHA1d324c849b964f5fe765ee88e9ca44d38d535cf01
SHA256d6f3d9df522c69e7cd5c994335369c3f658eff34ef1d8009b5795041480c6d55
SHA51246f4ca9ec899a16a2c7d33cf5e02dd51eed600b4737f7f73642e97101674f3a0220f337cd41902b55505265a86fd7351cb5c18230597aac41a16f6affd3dd772
-
Filesize
1KB
MD51c541937ba074ee2825137a9d99ac280
SHA17c68356f342e6b99fe10f73dd31b3fa0c709d37b
SHA256ed4d2726b4f49e760df157c5c42d97403bac20659fab77d883009fdfc3f8b063
SHA512daafebb901ff66993fd4853dcc0af995f14c91a5f17b69f1639f413fcb1563a75c29cbb14d2161d94af8422ced678b4acb2a307c6bc1baa00ee365a92aca95a4
-
Filesize
6KB
MD58609378e5f36986e219e41033a4a106c
SHA12bee3b38f907be780ad01ab2982f7fe9c74c6116
SHA2564cdc6fa99e281702aa00b8077451f9320c7a0e0cf7baca9b3add7e0fac4f5305
SHA5124244297d5fab08043cd18fa1107290526025bdc5fc1a61fa7e7298559308a3ca2a070f8cadc78062d4080d02a33eebdf3bbb6d0ca3cf37efed3eaf67403158f6
-
Filesize
6KB
MD52bac7c186dd26b99d7922039ac658e76
SHA10d8ff0392d88a5923660c4bc707bacf32fbacbfa
SHA25697133eb36a38b23586df1bb02d9eecbebb28133ab703a48e2179d6257ab09a0b
SHA512f238fd9bafd67687cf0da93c34c0e7404af9fa95cba6c0f9f8435fe784116984f63a5f49f30adeda3e8e6fff01c4cadd0b5c13fa16a311708fcb12ee807ee1ce
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD558cc4254e4f3b8532be847887a4fb4b1
SHA1c517c420ed432f57426ab38378c1c8fc5047d54b
SHA2569b6f5c5beaf3cf78785a6a00caef18222de4588628a8f0e84e044d1c91523c5d
SHA512c365da100838c42957749c24ba4c32b52e3d7f39d0d78421cc2cd629eac85ec1b24c8ba7c4c55f6c0965c29a11fe08738c276003790f2cea3f316b4796b78ff3