Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
1830cebed6a995aad84b4560947a5ccb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1830cebed6a995aad84b4560947a5ccb_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
1830cebed6a995aad84b4560947a5ccb_JaffaCakes118.html
-
Size
52KB
-
MD5
1830cebed6a995aad84b4560947a5ccb
-
SHA1
ab0c0abac1806d987602ddbf374770ba6723eeb6
-
SHA256
019e7012725eb564f2de7ac35f67b1cf763ba79729903cdce712859eba9ccfbe
-
SHA512
ff5c21fc58d9848878e75f51651a50fcd0f8f0d1b43a90b58cfaf220feb9d927c2b85d803ec42cb3572d4b020885e08007e07b0877c6ede2e87840047632a4b7
-
SSDEEP
768:wi1S5y5vC4sYclRoECHpt8COfzL2BPlW29Uz:5g81C4sY7pOfOBPlw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 4740 msedge.exe 4740 msedge.exe 4724 identity_helper.exe 4724 identity_helper.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 3548 4740 msedge.exe 84 PID 4740 wrote to memory of 3548 4740 msedge.exe 84 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 3128 4740 msedge.exe 85 PID 4740 wrote to memory of 1032 4740 msedge.exe 86 PID 4740 wrote to memory of 1032 4740 msedge.exe 86 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87 PID 4740 wrote to memory of 4956 4740 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1830cebed6a995aad84b4560947a5ccb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb5e8346f8,0x7ffb5e834708,0x7ffb5e8347182⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13114723579464188012,1638040222292463315,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50809e1ab2caa4e43efa5ab19177fbfe8
SHA1a531c32d89e282d48ec2eb715e50c9394b47e1b9
SHA256bb5f42944e66d65ebfd10c120e5d79a2824455075e6159eebd44695a882e420e
SHA512797ed4248f3bba9659d38f5efa611c3a9a2dc7dc11db2338cf843a823949bb948cedaef6d620938f01f03a253ae084f0dcc708bdd4f2b73490b67c7d639d6d3f
-
Filesize
1KB
MD50aa0703dd85f892c479cbe5a42e2c44f
SHA19c580c46b15b25b96018f57a06f49579cd6c8909
SHA256ea3cb6bc97066ed443cda64c8174a9d9ea9a578d2ec7bb617d58145668230ade
SHA51251af562d00cf7ef7d6ce266b63d617a31a23d460cac02cd0131c7c5c008a98d71112105d6f7f6298d01002cc5123fabb670d09296bede2c83cbbd3471016fcc1
-
Filesize
5KB
MD57e8e985e742a4a5e86cd03a28e0fd6ab
SHA14eb6c657289485180b1e28a0f7b91d13ca0edc00
SHA25678a8b6fea2257ed08d62feeaeb76eef805a8152afc73517bf4e924a38568485a
SHA512a20c5c98b165d65a439522df882462fd1bbc4b98f8593cfe93e5375a3010335a3a8b85ac49094e5bf1d54d55cfc96814fac04815e52ec3db4ce4a5776c8f0b83
-
Filesize
6KB
MD5dab82c8b30dc6e8064577414bef4a3ce
SHA183e813268375ce28cb0caf835049bb7d1e8ae6ca
SHA256a200b892b56c90a03ca44453ff95e6668d26ddfccf107a223d7008dbad0f9472
SHA512cc0e501b3ea3a03e501ac380e4b15a7c6f673680afe33a191e37f3aa5d44d7a87470251eb3cb841197ea6dc3a0792d0036d5627c4f793b8bf2cfb8fee7aa47a7
-
Filesize
6KB
MD5f897d7abef9e24ebba9fe1c15e6ebbd6
SHA1aaea6d07006a0a58e0f2f419470f6ac7dc633626
SHA256ef3b282ccb108a515a4563f27df98c1fb06af93ca283976dbbe90e415d75e2a5
SHA51279b4b124acf9e5e571847eb14f7464054f59627a21275052b6d50e31a349e2694ea0ee2b50931c52e00cf924db3b752c83851a95067f6d298d1ef984da36def4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD555a93d18151ae1b632a8bc0096e80a21
SHA1b988bcbb2ab1a154902c12595b51679ca77eaf5e
SHA256e3518cebb018e5b17f46c1bf8b3d73e6623db01a8e8a4b0cd3b00d37c9d8f455
SHA51281aa9d9f2ea98a24077cd5c7abd3248ad3de568cce4ef9605b206f43cef50f015f88db7cfa599120158ff834ea8a05b3c82d87f6333c41bfaf7b6dc45b248fa5