Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
ff80181892d11ca278219adbe966b78d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ff80181892d11ca278219adbe966b78d_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ff80181892d11ca278219adbe966b78d_JaffaCakes118.html
-
Size
44KB
-
MD5
ff80181892d11ca278219adbe966b78d
-
SHA1
9e89af903574c7635f3a9aafcfc7cd5cf2efae5d
-
SHA256
5b0adee846bde2beff57257d86fa134657bc81c7c4b26387a1f8a7f807147265
-
SHA512
ce6c4cc36c9b67ef92acc71ac82dee05bcc7aa33ced22ec7675a8dddd03c7f46d1ec21379d3359479f571ab5fbc97aa40c5facfc96d0f13a3abb8c22511d8233
-
SSDEEP
768:jiDk93p4KtLz27Upag7Pc640qLd1HhyVAuD80tJkA:j2k5p4KtLz27UpaIcH0Wd1Hh2AuD80t5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 4564 msedge.exe 4564 msedge.exe 2012 identity_helper.exe 2012 identity_helper.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4900 4564 msedge.exe 84 PID 4564 wrote to memory of 4900 4564 msedge.exe 84 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1648 4564 msedge.exe 85 PID 4564 wrote to memory of 1572 4564 msedge.exe 86 PID 4564 wrote to memory of 1572 4564 msedge.exe 86 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87 PID 4564 wrote to memory of 1768 4564 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff80181892d11ca278219adbe966b78d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc88b46f8,0x7ffdc88b4708,0x7ffdc88b47182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,6432840246193383482,7253744960479344047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5db9b34d0b8968e4d1f123bfdb5a17da4
SHA19aa5f0e67da880d90027dfd9ad137d702df6fe9b
SHA2566ba978b6e711693fa6d7fa7fae77777f8cf194b5d6d4c2addfa258475889c921
SHA5123493bc679efbb76beceb49711a444fc8529938257b819e81a0e28e4c40387daa38447590f9e65c5d897806fb5e5d34d3a882e8ecbb27d9805499e6a6055af313
-
Filesize
1KB
MD537d0f4b7a2b1ef05dbd4e581cea5c97f
SHA16677670c7a6943834030fbb12ef2f33ac97e0b42
SHA2568317e519894a80b2fc12aa21f4777ff50ec6b44815d02834773ca5c6a65f9d62
SHA512c8d68588dfba097e7cd21a02982058dde144d25941e400e03e85e45885d1803ff72c8dca689b2fda2b5cdab37ed5a66c2f2840f5ce7b54f558730c4bedd601f8
-
Filesize
5KB
MD5e37665d891dfc4ab8be0e21b0fa65461
SHA1cb2498be856d53266353411f6031f86f7b336ebd
SHA2562b202d331adbce37e585f03e5444c0ba67bb865ff7eadfe967de71363152cf8a
SHA5124db6e512b005742a94c19ac7edf71558074b5acb4f8136ad848b8280134993b95fcbe4d66d63a8f25aeb7a32838763d68bba32893b2bfc9f368153c96ee22505
-
Filesize
6KB
MD55342405c0f2b3aa35284c0900a28c4b8
SHA128696849338f32c56137383767255d29f421daf5
SHA256f48ecc3ea25bb95c7ac22264a60f2816e76eb758b9703dc1b0ad4f06d1d97d56
SHA512b3b86aa3aaf5b83456f8bf5cd7d4275111a4b7ebc8ed3df3cae3529efeba05dd12e0398645646695e12d9ddad4be538af04ad71ea95e39a20cca7213e7b5a079
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5ec139196b68ebcba9997516009328307
SHA1312f238566f6e89894c97e772dee42fb98c2e06d
SHA2565bd76cb088fe4b8d8b0c9564afa7717baf5acf8279cde359d306ce333c2ffe21
SHA512878eb7aef0a5d661eb41f3dc89a05819be061d2be2cf58f6c6386bbb038ed274a492721b03b2ea15adcf95efeece8e5946958ca2f47ccee037e85aabe50e8360