Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
fc0593bf808a931d65d22498c7252f75_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0593bf808a931d65d22498c7252f75_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc0593bf808a931d65d22498c7252f75_JaffaCakes118.html
-
Size
23KB
-
MD5
fc0593bf808a931d65d22498c7252f75
-
SHA1
614a737e356ecd65668507042437d88856e8b719
-
SHA256
a5334c9e5dd5a6a14ff7ede656e83a203b0474a4c3c9638da1786380c09a4ae8
-
SHA512
2d8cc36014b2a0f37e1e3db11a3d17130225b5695c988fd16b32d953baaa6991a493c0c915c729c234a78a0504ddf963862217d4c003ddcffaf0023087a742d5
-
SSDEEP
384:SELUZbu0oBmOL9QqnBMJBMbqHKEDs13/ata0XkQbmZatFye0c/iFkTVK9gI1Mid4:SELUBjoBmOhRnCJCUs13fr9K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 1032 msedge.exe 1032 msedge.exe 3312 identity_helper.exe 3312 identity_helper.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 4272 1032 msedge.exe 82 PID 1032 wrote to memory of 4272 1032 msedge.exe 82 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 1164 1032 msedge.exe 83 PID 1032 wrote to memory of 4576 1032 msedge.exe 84 PID 1032 wrote to memory of 4576 1032 msedge.exe 84 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85 PID 1032 wrote to memory of 3580 1032 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc0593bf808a931d65d22498c7252f75_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c68146f8,0x7ff9c6814708,0x7ff9c68147182⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6280186903399255961,14584633488184057844,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52c6dce4cfd356798ee0e158d809dbc32
SHA161030806af9ecc1d9f332ae6c6a25bd7470e7ba5
SHA2560eef2c46cd8885747c3c59414764e20c419afacd005ee83a1dfa6bc4895725c7
SHA51294a33b7399dc3a20a01eccc894a1611ecb1567e83fff4938aa73d64e384afe87b4d39b223fc876582cea1e5cd47b0a76377d2ac4d3ea8551f805b06bd22af9f9
-
Filesize
1KB
MD5de9c4662b6286376bfd452e9bed312db
SHA1b39c4e135ad6218dcd4e8d691cfe266743fd2ede
SHA256c1bd54dfcb21756f891f28b6167968fdacf07f9f4027f2afc2510bef97912b8f
SHA512c933d4128d4acac18a0336e86d284d94e9f1dc4831944b6c8a0ea0b8a00bcaaff17e319985a331d644f213a9b381e8eb0bcb3adce29f31872b75c836c26bcc1b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD569710a9e107e08b70bd6094355149899
SHA17c198bb5ba49d650554881de0b7e328a9a30e846
SHA2564bacb6591aae817054579fa8ed57fe9f268d1ac94db503b17f50b730018913e2
SHA5128aecfa4b91bb41a027a187daa6f732affea5e7c8c314fe336caf7d262341877d8bb0aca624a980c7e6ea9c97ecc6034cd5f7ddf3b7d6c2dc9b4665a4e2a284a2
-
Filesize
6KB
MD5d6486a2eb06641db2c1174c151aab295
SHA1419a216f3b4aca76c8a566320041d7c0efad6e57
SHA256639291d02bf58d9eb9ac51de1dec765addba6bc16c0d2ece81e770dd2e7651da
SHA512e628b0aaa56a7850edf631a6dc5807283299a0761f2245095c3171d98c3f49787dcdb24edce596d360c8444cb0eba92231adad7fdbc0b2b8eb171d8bbb54ebc0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD537ce0931e7bf8080f58a394fb9aec016
SHA16f0b69638ffa72273f82a093bbf367d134ec7b38
SHA2565380e537db35c11de2f4da8e4f356bada1e69f6b7d98e4ecf3ae15fe577147ba
SHA51262e9bc0588afedf5c3b36bb78da8943963ad7ea5ead61e9be10fac39706fe4dc4087aed27ac9a6eddd85eb31df57c9e43544fb68fee8d341b41442f4d0e5974c