Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
eac60140add8b07224409f528f1bd4db_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac60140add8b07224409f528f1bd4db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac60140add8b07224409f528f1bd4db_JaffaCakes118.html
-
Size
57KB
-
MD5
eac60140add8b07224409f528f1bd4db
-
SHA1
7ef88bc867a304d6750d3004991ed5d970529896
-
SHA256
1a97050e1c0ceb8d124bbe4df53fa0dc96ea825d4b683db93d10bb639c21afad
-
SHA512
231a73f94019effa07b69b8e442cef82cfe5e76fe43d3cddee35995934550eb4f1031fdd81f8098ca793077975af324e1b16a627479ac454f747e33cf1a2b10d
-
SSDEEP
1536:ijEQvK8OPHdsARo2vgyHJv0owbd6zKD6CDK2RVrojzwpDK2RVy:ijnOPHdsP2vgyHJutDK2RVrojzwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 3268 msedge.exe 3268 msedge.exe 4972 identity_helper.exe 4972 identity_helper.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 1252 3268 msedge.exe 84 PID 3268 wrote to memory of 1252 3268 msedge.exe 84 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4564 3268 msedge.exe 85 PID 3268 wrote to memory of 4936 3268 msedge.exe 86 PID 3268 wrote to memory of 4936 3268 msedge.exe 86 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87 PID 3268 wrote to memory of 2840 3268 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eac60140add8b07224409f528f1bd4db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7d4a46f8,0x7ffe7d4a4708,0x7ffe7d4a47182⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8604112349694730307,10852697904823373467,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5a1a2d1169ade90cebb845b27c5326e33
SHA1554dd79693a37ea1a9e761f2318430d0da90e14b
SHA25688a8fbde0bc8d919d00ac66f56cd5592c65d11689d6ecb432afda70463b5e42a
SHA5129c72dea00dd7f7113cd90192d0fb2f253b5e8aa4320245983271c968698f26f17243ff5fad5b96fc0fe5c9d7589cdb2f9fa3a772417445a778642f103d46d5e6
-
Filesize
1KB
MD5f120e0e26825ecf78a27004eede64e61
SHA1006f7750c5a09b76a71d8a3c9e6f41f0e79fbdeb
SHA256e67ccff7009b40ae514cbfd0a908cd1d64e81ed90c1da9bb62576a9a4d50b02f
SHA512aefc2bb19eff48fb66368d713463322b369572cf87f6e8f690d18bd72ed8eebc40f2e5f96fd2eda0a06e186f1d09471ef3baec0c82fca0417c7b0497477cdcd9
-
Filesize
5KB
MD584dbfd9cb3a78dcd3de3acb03aa8273b
SHA1751f813474019a30ec24d032a74db5a36167cfb8
SHA256e1425ca30c988dbc33dd4e5159e31ee68700c2dd062cc7da5439ee39ae803f25
SHA512b46e4d644390b6b150b2a61d1899c950fee9990f1d23ffeaf3ddd1e266f67fe47dc13b464be801ad02d4d2478b21796d15f581d71191a4ea79c8fc4c02c1550b
-
Filesize
6KB
MD553c899f749db0321caf4eded93ea31ae
SHA1a803261da0e32dc5a3d04e0c46afec78c7010501
SHA256498bde1a0b82a8710fed6582bbd1ebeb089480c891394aaea4307cd6d90e8254
SHA512d38fa453f18141fd5f574489c24cc81fc93471a3be5c7fe3749778238d97427291e8764e8bcdeee42923a5ac043724c3276abfa529cdc995bbf5dfd7790d5ca3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD548061089d6068190cc756eff008aa555
SHA1a1bddaea79a2258309ca71e9bc201d3d8987141e
SHA256694ceb6a60071ecc4e4a6809cb59deeeaf8597619f38f7465b0a1ccfe44739f1
SHA5124faa01d56ddd68ca9c7c887af60820361b4d0eebbbd2d04a151f3f002702f63e4c8e14408cbb35d6997e0c06981fedae0a775828c409ea5b224e1d622ab03fa4