Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
f9eb6e56a137c4ca4ea91835c8165bd7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9eb6e56a137c4ca4ea91835c8165bd7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9eb6e56a137c4ca4ea91835c8165bd7_JaffaCakes118.html
-
Size
41KB
-
MD5
f9eb6e56a137c4ca4ea91835c8165bd7
-
SHA1
445e3012bb0ba982bf4a9c8cac3ece41e29fdeb1
-
SHA256
b67df79ebb29f74a21ed59851d404bd45224e196abfe15e2373146faa7ecaf54
-
SHA512
e2fc7594a083c07cff1f9ef7f50188059b2ad3f87e9c3eaf056f5a43dca2734266cad96d18999c87e39a3cf595460f18687bec4f469bfdaa6177dcee6bc3ae84
-
SSDEEP
768:kFabl1bXAlb2vb4xUJC/r9bClqVye1oGee01J84JnYAX2Vw7MP:kFaTDAlSkxUJCRmlqVye1eMeZGKgP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 1588 msedge.exe 1588 msedge.exe 3420 identity_helper.exe 3420 identity_helper.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1588 wrote to memory of 4876 1588 msedge.exe 86 PID 1588 wrote to memory of 4876 1588 msedge.exe 86 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 1056 1588 msedge.exe 87 PID 1588 wrote to memory of 3384 1588 msedge.exe 88 PID 1588 wrote to memory of 3384 1588 msedge.exe 88 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89 PID 1588 wrote to memory of 4124 1588 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9eb6e56a137c4ca4ea91835c8165bd7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdcac46f8,0x7fffdcac4708,0x7fffdcac47182⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,4357016315712989711,15442612251905263504,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5bd4004b4c718a2349416f9bcaa1cde5f
SHA1560be01e865843d76bc80d3069963c911b29fefa
SHA256b81f030c5d1e5ddcf4020fd0d1722a3875918c5379e94e82590d23514fb5f164
SHA5127009373814593009b1a8dc32ba2274e7c1fe6e024e46e60ab7a4bcd6b538f0b25066939b87a26d3b11c748bb9fd034576a5d1aa8a81a69cc7914ba8ca7c9da20
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD54e7ee48a5de917b672eb263a04cb78b9
SHA1157faece1680645eba000773ba037de3da492fc3
SHA2563842fde5677ff703f4d072fcc4b041e788ecfe8a2bccb747218861d7745ba381
SHA512305f15555a5eccfd173eead10925e18d37ea16b199d654a66b4f706e12da88a9eec00b4d25aa5f34744c2610fb1204aa890fe2456451df9e62bcffc85313ffad
-
Filesize
987B
MD56989afb2243b6c053a4012d8e911569d
SHA1fd3e0ff2681e3912c5e549d0596b4291f1fb6fb7
SHA2567eea12019f11f4f2774db9bb519d1ec4ebb3b22bcfc2765392c940ced31e471f
SHA5126207bf43d4fd6adf70fc0544e09892a6fb3c2503ac16ac626b3892262a807f5eede4c6515c31ce08319f129c807fdb703219b26bdb53c71fe7207cd605b07a5e
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD53a8b3d5bf2d9788c5035e18bb4895034
SHA1fed1c6a96e0c58248fc59d74797a1440b561d1cb
SHA25608e00543e620c37d3aaad8ef779f84c8edfdc0fb034e4ef1e7f5b957901245b9
SHA51248a337f26c82e809845192fec52abb6d1eab28813d77c7eae2f1627101a93bca95c1e5d2fbe968388691986d31ca8f05938dd1f5e6b11073c521df27c32dfedb
-
Filesize
6KB
MD5f384915ed506872002d6e1415d68e540
SHA16f226b83a1f95c0512e9d92e02296cd93deb928c
SHA256af487f2f71a6de570a7ace5a8994c94a512e5d2662b2c36614324779a0123d3e
SHA5126b16a9cbb70c487d039a5fbb08dd479ae7835d82ba7865e13bd66a287cc995f2931891d6d03957f957be29220649afc6da05f76c12ec53903bf492b3d237cea4
-
Filesize
6KB
MD5176c098213c703d829b8616c5358a867
SHA1069bc50ca281389bd1ed8d6b60d8c856ce2a8edc
SHA256be397038246ef59ce39509364531ecead701b0ef08c8c1489fac81a610e35175
SHA512d28f6f41794dad97200c20bc65ce739711e32d6cfd173ba251610946a92b9609f1aea55332ffd341d449d8c8b53bdff06198fe63c5045f177ec8c0ea5895fed6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58ba95059dfa1b3abe8f8f0c9e6b1dfb1
SHA119b6b5bc786c51bfb525632c7926ed0e38afc6ba
SHA256d4b74afcff92492d0bf079e25006da06f6e349566f98a8e453ddd4f2417c90ac
SHA51274eb97d227e4fae1fcb21100a23de851d1ca79ad30b71ef4d90a3c99a635602c1470a73cdd277179c8cba5357d00124e2cf2414f8e8e8a11f2541bd928c05a10