Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
076de06b306f9e4e5e9b39028dbf2a2c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
076de06b306f9e4e5e9b39028dbf2a2c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
076de06b306f9e4e5e9b39028dbf2a2c_JaffaCakes118.html
-
Size
57KB
-
MD5
076de06b306f9e4e5e9b39028dbf2a2c
-
SHA1
c38dcb00c5e9e6c2f4bf5586e3cbc07bd8876da2
-
SHA256
b79a2b073aba1bc70d033b774add6dd712cb31af6dca368b48189e5104153c18
-
SHA512
2cdeb396f90a4b3b9e8e9e7f3a80968affa7eb26778c8ff43fa248a290b4ee57d14b8229d9b54f0650b36a0af26ae2d6a387cd69809e728cd6af14074701d55d
-
SSDEEP
1536:gQZBCCOdJ0IxCeh94f0fsf9fxf0fZfSf+fIfJfp4ftf7fFfUfsfMf7fAfXfPf2f/:gk2X0Ixy8kFJshqmgRi1jtckETYfH+qo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 1184 msedge.exe 1184 msedge.exe 2124 identity_helper.exe 2124 identity_helper.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 5096 1184 msedge.exe 82 PID 1184 wrote to memory of 5096 1184 msedge.exe 82 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 3904 1184 msedge.exe 83 PID 1184 wrote to memory of 4444 1184 msedge.exe 84 PID 1184 wrote to memory of 4444 1184 msedge.exe 84 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85 PID 1184 wrote to memory of 2424 1184 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\076de06b306f9e4e5e9b39028dbf2a2c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2e0146f8,0x7ffd2e014708,0x7ffd2e0147182⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5298051945404743659,14227626266339954618,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5cb07d75b1b1e27020c2322fec0219aee
SHA157d0a6fc56f603b3218bd14aae4c284ea4fc422d
SHA256317eaded1b0b96d0d83e029d6a7ec9ae2b7e0902e6da413f223555e05a7e3ff3
SHA512e300cc5d1b30d026be8331f8daf3d58e8d67b6989a8b259cac1561b33af0f48560b07f1a3d7851e66e2e6e17837e133c60fe18e8589d74864d078aefd60127a7
-
Filesize
1KB
MD5f8de2e2de41a7bbd424498568ef623f2
SHA1abbe350577a770014d00d6a1506d6d9d9326fd44
SHA2563b75c68e1a48c2490252857ae0b76cff7cdc00698b85b374e8035170b97c87d9
SHA51286f59ea6f6680e8f6c073021f59769965d36018fa3b783ca6625baa1aebaa7c60b025a82dd5a35ecadab389203ec7ccf42aa192ab361ab3b82d274d2ae6f455f
-
Filesize
5KB
MD5c29b729d3f310aa7d701a3b6842ba913
SHA14bf1043edf42f348cfc6896245c8a496d003d41d
SHA256696ad9deca2ac8ec691775859a348af0f2dc0197809e8d31a78bf9b2bccb58e6
SHA5126327a7d7bde7e5517a24559a96794d9e70f92f4b2ece3e8e67b19d61d6cedaf3936ad7bc6bfa83ff221a28b4effeba61370829811f20ac4a949f92d9247bf03a
-
Filesize
6KB
MD5484bc2979a92d235073cd03950da1d46
SHA1ec74dff4a4009d327a545a14f0a862a127f615ef
SHA2564ff963c41a6737ff6c040bee47436551f0c92ba1b79feaeb9f1191e5cc5a8c31
SHA5124a5965608e0afab0cd655e5275de2b3c244ad1e0a4fe619d16ab9eb1b93ddf520d967e1b2fc03c56e45e1fdd93de8099e7cb2374340d5d315b59978f4ffe611e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dae7888a2e1e01f1fff3062ee61825d3
SHA1adc1b62bd30abafc4c5b18033d8c73383024685b
SHA2563de5576383d2e8b66e21381e4b91b7eb6956771593873fd8d005abc47e91780d
SHA5124e2a1e322d13bd5a3e753a42d6ae701567230f62bcb54b55fb0926b8d31e1d366048949f7364a4b02b3d4302a1895059d6eab04208cfe35915392958a07499e5