Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
effb4b41ac1c145f77ee43ccbf79333f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
effb4b41ac1c145f77ee43ccbf79333f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
effb4b41ac1c145f77ee43ccbf79333f_JaffaCakes118.html
-
Size
52KB
-
MD5
effb4b41ac1c145f77ee43ccbf79333f
-
SHA1
e1bbbc48005efb7097b1c2432cad630cb6e777af
-
SHA256
16ba73e7794ed276731f76811dc592789912fc8b86dade390f6c8881c6bd84ab
-
SHA512
3bea5b444b9ecf0a87ddf34b1f655d3065bd170663eb276185748d46ab1d3d5cd86cdf01dc1b42b59111210bad90f99bf20f52ca8265a9886cb0de176133c835
-
SSDEEP
1536:WuwW12lSWQIaAkNnh9L4eIaedgePqv5ljeSAfas3dhy:aW12AW+Afaszy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 4928 msedge.exe 4928 msedge.exe 532 identity_helper.exe 532 identity_helper.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4040 4928 msedge.exe 82 PID 4928 wrote to memory of 4040 4928 msedge.exe 82 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 3716 4928 msedge.exe 83 PID 4928 wrote to memory of 2596 4928 msedge.exe 84 PID 4928 wrote to memory of 2596 4928 msedge.exe 84 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85 PID 4928 wrote to memory of 3960 4928 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\effb4b41ac1c145f77ee43ccbf79333f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc603146f8,0x7ffc60314708,0x7ffc603147182⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,159341275878630986,3573143163536174809,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5f21fb8f99ef34bdb069282a09d53afb2
SHA1409181a03b390b88bcb34eb0e58764b667582ebd
SHA2568069fdfec9894e51e2771c11b17fd41677db7c436d6b817c1b00b9b537cfcb26
SHA5125191553ac4b7380b551d2c23571021dee33d6a1d67b5256dd3f924f87f49be6c2ae5c91dfefb81d6bfe092ccdc106fec2b67dfa7c740226ec6381f255544d232
-
Filesize
709B
MD5a13fd9fb9c0145bc3764bff076680475
SHA18b8ae8be84dec32d34a3669f61803fc8ad825245
SHA25673d6949feded06bc1463814d6edfd1890ee1b605020e8dbbe4c8e90ecef7169c
SHA5124635559f21cb4b402bd994cf63e67cdb3e26b906b1ca9f830f7395f8b171a4022cc3c3ffad4b8ab02605486ad8b0a464f6e4c5e9d093027afb6fa22ba747198a
-
Filesize
5KB
MD58a62b9616f786f6a6315d2d60c610a25
SHA13669811f3c4f22e8541543a68938764a7b20a769
SHA2562bb1100ee5bc101f34d2c06823ccc4f8bbe529499bf227d74ecc9ad8ccded4f0
SHA512f00707c6f0d4e7603198abde2bd541fc10d3c1543224dc5c855294cd49751d020debd78d60ebe157344df9c5832a02ba0d8597c3207fd5ff05e97920c5110aac
-
Filesize
6KB
MD5a23e0cbf4ca75c5ddae2f8ac0626ef55
SHA15b44736f62f88890c2eb28cb487ce4ac680f6663
SHA256ae8a018e62760a6e89fe0e44cfddf4be30b1cc9643e0270c3b69d3b7557cc606
SHA51228fe60d68038a4482281defceb3fa8e5e46b36117f887408266e0300fb6c37d513073d0a08797e4858481234b94050f60ee7e8a7f3489b4f6dc0c87b671b3423
-
Filesize
6KB
MD52a351d98a49cc57e3ee6890d75420b8c
SHA1064eea10145327dcee3bd97bd4bd61dcf02fdb9d
SHA256e22f1339e9f2231eccc305ae34b7f0a078fca08cfa716ebb380b997daf809d0a
SHA512602cce0e3e7680843009186a1ce79b2e45baba570364564710bc73fbd3a8730885a98892cdc3964a71f5f0213f7b441f7bfcc170e6432da8a93948ea9c71bff6
-
Filesize
540B
MD5f90256d9daa56f4674baad00639f661c
SHA13421da0b78bbc0b73efc9ba0118c91f3e9ae003e
SHA256f60ab540474c1123b017d0ffaba0a6e10041226789755413ec59bc7e6ba7ed60
SHA5121472554815680694cf9394cd764406c983ff6a665d9cade58ca9f4316c9e3960f8a793f16a2e57dcb17db9aa6933c7f8fcf4c3c9f7642195d1bd1253695da834
-
Filesize
540B
MD528760c81c20a8015e6bad9175dbcfbe2
SHA1fd5c479b9a46449d9220980ac5fa0290cb985234
SHA256e9dec1779043339fd341a1e7bda03075f3da00118616c040f3e67e8f5ac8fcb9
SHA512aa163ed9655518a3eae3498e44808258a23e7e47cf1630b451e16eb7c26a5f063013adea74c9e77fc568d910032a9afe34f7a0223933989ed05c8a6bae24f392
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fca66b775c7fa056862670c89a60214e
SHA16b0e591f60b29316ab6dfb39e64ed5c3ad179abe
SHA256ae1dc53f2cdfbf96c07295be92a51c934731ac11aee039c3716f8a86b41a7f31
SHA5122db5251775e6cbb906b7613a1fbeb90b5dcf67708435f7e5cbae03fdb27227e44d87a30d8b7a0215508fd7fc284f59b7909607bc2c993b5de132728dd46c3cc3