Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
0826ec132047314e73f194401fba1788_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0826ec132047314e73f194401fba1788_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0826ec132047314e73f194401fba1788_JaffaCakes118.html
-
Size
10KB
-
MD5
0826ec132047314e73f194401fba1788
-
SHA1
ee7043af6d84ef7f79deda0ed54d88da34cf1611
-
SHA256
a17bea2c66c3e8d0f8f020cf8a0e28e3f014c96077d33812275447c38a1d5589
-
SHA512
70605be3ce0108a2269dd9a7bae37fa46091205ceea1b9a93b73410642f15e4872a10edf75df10940d1975ef5ff07be665b512ae3e6fbd2a4e64010c4dcba7bc
-
SSDEEP
192:2V8lIsr03jA8k/w1wvqLkZDBNknwdrIat01/6uBuLbdU8d:s8lIcujA/guDBNknwdrIat0/6guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4276 msedge.exe 4276 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 3432 4276 msedge.exe 82 PID 4276 wrote to memory of 3432 4276 msedge.exe 82 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 3692 4276 msedge.exe 83 PID 4276 wrote to memory of 4784 4276 msedge.exe 84 PID 4276 wrote to memory of 4784 4276 msedge.exe 84 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85 PID 4276 wrote to memory of 2384 4276 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0826ec132047314e73f194401fba1788_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83db846f8,0x7ff83db84708,0x7ff83db847182⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,17350214528159957305,15084636889158926668,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5356 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD57ded3c0dd052cd2911fec12546bda1d4
SHA1d4c4b7e49cc5ab2046a4359e49f4f7c2efde5066
SHA256e9e8e46629c301db5e7f98b60ee2c3127e93d42e9551bbca49f5e68e51473123
SHA512e9eb4b86878998d78ca14807b5ce2255b35f385deb46538ad77c158ac1de25d145a355e21f04bff22e3b87a8e124c1caeccd961348fb37ad02c07d5bd5407b9b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5bb8fe69fb4968e26ad76a2d0d7b9dde2
SHA1596d915d7d81d7becaca8a574bbfaad73434b6b0
SHA256b56bea626ed99dfc5f5c87e10ccc6b5617dd2a8a4ee6cc5df586cfc1051535e5
SHA512efaac4e4c2d03cc9c12a97b2de6fac7d8f2a24b70c09ea04d3d15226a27dd438aeccde4de18479d7ee2f868290bd2fb0bc0a776e029d6fab8718ec4cefa54c29
-
Filesize
5KB
MD5a58ab7d9346c1524da667f6c2dfb7ad1
SHA1690cae74a962e053137d40ff27e5efc60b7f199b
SHA256d7393f5f656be63b823613420ae29ab9528c08c63f174a9f9f0abdbb540b3b6d
SHA51233a88969c64f71baee8a4e69dd03f879b5f2e64b1563d89239defb4b64dbcb729ed81588723480890792951614fba25e3cb3bd8dacefd6c778ff2f50a6213a54
-
Filesize
6KB
MD5eb4d6b87f8e9a05127c1053648d3c50f
SHA1dddd24401a88ed5c6177a5a11e65984a9fe56d81
SHA2568e2802ace4ac5e6edd891e3edf67aa8073d17f54a739bde6f207356e1ead5177
SHA512c0bca3d8f3a4ef63c7f08011559fbef0b6633a4b03a1d4efaf2aa39ba96cb3093cb6a62730af02d7e0007f4d3d13b1ec8eb9b3b8cb9ae8b474fb88e8844788d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cb71ac9f719ae4b769922fbdf8db4d1b
SHA1f09e9d9bfb8679674c5661e162236a18a81a1ca1
SHA2560b7133b64e26512be820fb43c802e881334e75da5cd53884e767b2b562f31bd9
SHA5121896a51eeeee7f9e026131d19780befe88afb286507226c4d8cbc0eb8de1bd792909677e0962c8e0a03ebc4f889156b32e3864b1ab00f0c9ac51b82f86b79554