Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
172671cd53996077fd3c3689f0202dcf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
172671cd53996077fd3c3689f0202dcf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
172671cd53996077fd3c3689f0202dcf_JaffaCakes118.html
-
Size
7KB
-
MD5
172671cd53996077fd3c3689f0202dcf
-
SHA1
729d0459652331a9fabb92cf8378bcb7cf04aa30
-
SHA256
5e51beab3de3a7bbbc53de05c853efe91bf2640afd7563c9ebe53bcc89566f31
-
SHA512
9990c619154ff4f7ccf6388116f5b68180e3d32c2d94b6b973e10136e5072d4b35634bbccc300d217ec1f04f7b53abad84bdec3c2c276ba0c9fd6fa757dd226e
-
SSDEEP
48:ImMq1Up8vmbBs8OgAiEgVr+CflxYOZAyNGWBXtz44xt5YWDrWN8klvaUIh+ZJpbD:SI8f9NBXYwoZLpbpynKvKR1dRQcRC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 1932 msedge.exe 1932 msedge.exe 864 identity_helper.exe 864 identity_helper.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2604 1932 msedge.exe 82 PID 1932 wrote to memory of 2604 1932 msedge.exe 82 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4560 1932 msedge.exe 83 PID 1932 wrote to memory of 4832 1932 msedge.exe 84 PID 1932 wrote to memory of 4832 1932 msedge.exe 84 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85 PID 1932 wrote to memory of 4184 1932 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\172671cd53996077fd3c3689f0202dcf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff379446f8,0x7fff37944708,0x7fff379447182⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1328 /prefetch:82⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3325130526954324128,9107081109634908483,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD57292e33dfdab123322a5b408df614302
SHA190d13193ea662cfd86fcc0352a8ef2df0640e531
SHA256fdb55be14a46c24e76183969ed051007dd2d0f2f6eb5c77985bd8db7a6da8a29
SHA5126176916e3f30ba202c3e631a70027876c75f5a262ab3769028f9574b14f42d11a00490d79f2a2d5cef9eaf6c4093ef6398bc3a6c2af1f80988d9ea65ebfe55c3
-
Filesize
182B
MD59142b251885531ea20ad790f115ee80f
SHA1bb6c5b9641a2c59b86e2cd01febbcde2357fb68a
SHA2562fdd7ce8cc41a618d93ccbb41ddfaae5c629e970f35faa4dc5c1f2161c27d28d
SHA51223899fb4fc810ea72300ad7b817bddac1b7a8d931e7097ceea6a342d12ef70065138812c8324b3aedffe8dffda4eb64f347e989840ed227a7f5fcad84130bedf
-
Filesize
5KB
MD5d3a4da0847c9507abc8aaf76a3db5d8e
SHA14209c7d1363d17dbbff990549eaa2f315014fca8
SHA25667e9019a0c32b8379100147ebdf5a6190739624c61dde4c378c3ff27545fb707
SHA51206480afaeb9180ba4c7d2c4c3b44a7e2e639176f11d2978a60b22f7a89e12ac0debcfa443bc9a1fd4976ac3d48e1d70f6fc6ad617d33a7bc38b82e45525f5933
-
Filesize
6KB
MD5247f3af412cf75c0de593255ee878753
SHA19b89485bf3407c7c8d71f1849509a501839d936c
SHA2565c2a93255eedd6293891d6845ec13d5963f638f98569f9d238299ba374af1a6c
SHA512aaaadebf41d63a0342ec34d32cbf70e62db79b15c2b921b82977d16f27791125347f133dbd38071f1dfe742e2148b9afc2e27e0156949a4d0e427dadb6cb2d20
-
Filesize
6KB
MD58a43c852c0b910557529cbff397e72cd
SHA11aa4c22435a9e916880f231a8a0404ae4f43caa5
SHA256c4d139e8ce6ed07d56cc163dd47514d3e84384510faf4df42df7e87ce636bab3
SHA512957998f3fe59bcdaab6e89777841bd048d57c3502c83a4c2d2586b337c9138e0b52ccf3e8e44c4771a3fa829a44f5930ef123116a78a446b789f3c93eb591522
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51ef493a51516bd0dd5b48a8047604d5b
SHA16122b3cc95c729a107fc1bd36ced8b4763bb0fa6
SHA25665bed1732fd1031993c01f9d919a4280fec5595ef3b2258c2b52c9305c631155
SHA512e87e4c95e45d00016cc89e3dda641491402e0da24708119f77206aeaa062e9b11071ee5ad142c6418da7f42565694027ea57978ed6c77f70ba0caa7fed2cc887