Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
ee8e960dd23a3473938f639e2c68662a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee8e960dd23a3473938f639e2c68662a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ee8e960dd23a3473938f639e2c68662a_JaffaCakes118.html
-
Size
327KB
-
MD5
ee8e960dd23a3473938f639e2c68662a
-
SHA1
f2b4b24726294739ce40d2a260664af59debe14c
-
SHA256
b7dcf16751fc53fd97dea2a3d93df77cb52488866f6c12ab411284ac06041e36
-
SHA512
0eaaf8a417d112e54e998602024d5fe28b0179003a2acb1d8a439ca17e45659ccb238848ef5a8e40713015ed7a0f8751c638adad005f56a43f4a2c63858c69d6
-
SSDEEP
3072:Hmk1pBDAkirDNvG8rll4rbtKHCXwDxpeFjo1Jlt+U+8Ffy1m5Z+838/rHkHkw8p9:Hmk1pBDAkidJl5p+U+7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 1788 msedge.exe 1788 msedge.exe 3340 identity_helper.exe 3340 identity_helper.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 648 1788 msedge.exe 82 PID 1788 wrote to memory of 648 1788 msedge.exe 82 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4932 1788 msedge.exe 83 PID 1788 wrote to memory of 4156 1788 msedge.exe 84 PID 1788 wrote to memory of 4156 1788 msedge.exe 84 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85 PID 1788 wrote to memory of 2324 1788 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ee8e960dd23a3473938f639e2c68662a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce3446f8,0x7ffdce344708,0x7ffdce3447182⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2668 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15965384008923037110,11730584828727618691,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD53cd5e9138caacb13a3f2f09fc5136009
SHA144a343eb47a6db2064e4bf999e2e136f0a14f0ca
SHA2563a88cc11e50c4ab63427bc2af81ab449a2631f7d40b42c0c77204656b747663e
SHA512eda579808cb0de6d1624a86ddacff21f7205dd26f6f4e74a4d6df80742a0f671cd4a7af6c0dd240909494f96f8565ab826bfd6392eb0f24598dec716fb0e6a8a
-
Filesize
1KB
MD5365d6ba707ab76bd72b23f227bd78823
SHA17f5481e7b927a79853e2e1d7ca7531cf20b0bf63
SHA2561505a7e399b201bca1f8449d308a419a81dba33c444a7a5c31477e9b29dc82a1
SHA5125364da40c7a1f20e048b0b54ec264b4b669a1e415f887151d325fb5b5cb8195724799471d6f9d71fef6a84fbae5bcb653c3f8c7ef8337572e0406048aaf72271
-
Filesize
6KB
MD57d9c82920189fd3d5cad44a2e195543b
SHA1cfca88235888a1cabd2015f50d1b005cb60b4100
SHA256d12d7e5db9781f717201bbbe9f7795e5178806e1914944442d341c7dff5b4f94
SHA5123a3c1ba06a8786d52868eee4a294ef22c7e03a66c25a787e589508a2f4258b889bd51863d8dceceaa78edb65b575012dcfcaff9c4c39eca433a1b6452128705c
-
Filesize
5KB
MD5ebccbd2a36f29f6eb7ff5d3911f33a11
SHA1f07ff278b5986f257261cbd38a1b8ef5b289f4a0
SHA256676989eef194773adb077a4aa01e555cca03b3878237692bf382fd321e5d9409
SHA5125a04f1c43c996701f22b97cabb5a410f1eed6eccddc804115cb0458dfa690b63697d5741de2c7fd02a51dbae9261d48fd5e33579628cf6ca81bb90390cc742c3
-
Filesize
6KB
MD55a80c4fa42a9d8c30501499a80cbb326
SHA1637e4c00f1e08cf3b0422f759a71396d1b4f686c
SHA25691a6dd321e66a9043af04830d594f794f3eddae78d1e722091905d713ecfe27c
SHA5122f90987e04c0780ca3b1c02368d62d0b72cc86a5d69279d7f3328b8938cd0121ef5f8b05ab48e8163ce83fc95fe1d1575623eb2124bb0e2facdd68fc746ec886
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD503b01e69f8bdd27996acfacbd96cab99
SHA1f789faff84273cc7aa82b4e677abe55c42b85aa5
SHA2568524cb9210ca5a9ca6744dabed04f20b64b78c29712227430a527cf62cce5e29
SHA512811feaba8a34b3154ad41fac3a72c96ffaa4032489a7d0ea6051450cbda5e7c9685a72bf672f815d6e990b8538e321fd471ae9f8748cccb60bdf985f0e2651e5