Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
fb755e1ae18d3b4620974273104f865c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb755e1ae18d3b4620974273104f865c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb755e1ae18d3b4620974273104f865c_JaffaCakes118.html
-
Size
40KB
-
MD5
fb755e1ae18d3b4620974273104f865c
-
SHA1
ea30ad14ca46e6b6187d1a9c58cace9e74d15f99
-
SHA256
bc63a76d3273981f8383cd214e48292d0759bde3dce0a158bff111d1c5a1389e
-
SHA512
9ab16c12ee2f2783c06fcb3a9dbb16e94029db196566f804a40f6df37eebe661884e63ac3b423dec52d0b63263ca07c52b7bfb795dbf5a8fb1771771314c6618
-
SSDEEP
768:v7I9T0EipBzWPya1kITCEJlTP4BcAc5TSAD0rFDXNObBIaQc:DI9TupBzWPya1YmTP8USk0rF+3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1596 msedge.exe 1596 msedge.exe 3272 msedge.exe 3272 msedge.exe 4684 identity_helper.exe 4684 identity_helper.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3272 wrote to memory of 3580 3272 msedge.exe 82 PID 3272 wrote to memory of 3580 3272 msedge.exe 82 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 3688 3272 msedge.exe 83 PID 3272 wrote to memory of 1596 3272 msedge.exe 84 PID 3272 wrote to memory of 1596 3272 msedge.exe 84 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85 PID 3272 wrote to memory of 1956 3272 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fb755e1ae18d3b4620974273104f865c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3254626413500848413,12039469610918524283,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d0991dc8cec1ad451844b2861d271eaa
SHA15bc209b6df8e9a868ec7cd4b8bb9f146ad7cc234
SHA256f2d887ce30a060d149b93ea5b1da0e46475e6b2fdae7b874f831674ce94e2c1a
SHA512f345cfd9b5ae4e731025713fe4b1125c6bc7ff51bec056c5549dd6b89fe5f4292c52305f1aaee9dd3d1dfa3ef0dfc14f90748d4dec5df8f5c993e5521b84bbb5
-
Filesize
1KB
MD5df5c22fe9e3aa0d2dc051cfaf2f9ff43
SHA17eebe8d06a0d3c78fb90b7ab65ccc7d2c7aa63b1
SHA25674b397f83e007317fb211ec9658e1df8913fb2428f1afe4b4940cb029b779f5f
SHA512c9e3bfaf17a8382bffc8959fd68804075de98f54208ade82829dc7d3f20fa3cc61f5f054af0aca345cbf2d6b0504ac25ef89b66304704028dbeb608569adfe79
-
Filesize
5KB
MD57d5a85ad43fd17f96510653f3385d5c1
SHA1ff0e8937f98ab5554f17ab5c9bc405686cdcebbc
SHA256e0629045cf9a868d3f97f0edfc3748ad4c0fbe7b35a96d2485ad27abe5f41038
SHA512fb4141a84d461f96c32a157f7f8cbcaf6c1b8625318895b5fdc145be9701d25c0f2f5e2d1a6676dbe2d0f476556e823aa1a2d8f33e289761120506d239e74e3c
-
Filesize
6KB
MD582cb7d70adc7099f40965cea97eb6712
SHA1c63305acda4eeee75ba1e5cf95172de525614f26
SHA256a591246de8d40eef67617f2c27b1cd5ff95389314e75dd87d6d83125bc6d160d
SHA5126ce68e6c5fe651149d0cce6eccef94c57db9fbd2696e46ac0c17711711c66633c1a853d4bd9957b6aaa4f5731c1993f669bab51ecebcf2ba76c8d8729240bf2e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53e6dabfef4441013d066a75dd56381a9
SHA1c534833f87d25ab92d134ec2f1938d90e46acd1b
SHA2564aa58a6d4081a228c6b4cad2c59068e13e519d290d5ba092d6d359613af105fb
SHA51290782e519d1bdf8f8da5c0f9e25c3076379a419d95a4306f32a6aa5853694b138295c68ac33f05a6ee18baebd026c99c8feb1cc32fb4d1f04e4aeedead4f441c