Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
2c7865da42df387940169d5f98e9b181_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c7865da42df387940169d5f98e9b181_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2c7865da42df387940169d5f98e9b181_JaffaCakes118.html
-
Size
9KB
-
MD5
2c7865da42df387940169d5f98e9b181
-
SHA1
8034708a559f5f0e7a9e86c4997c1a59780f7dd9
-
SHA256
d9e4885dc3b1d70c9881c9d736b843123bd8f4b2b99857654f8ba5d4ecd3985f
-
SHA512
c96f4907d22837f9fc99dcf43572636e33644ee265d3bfb7b456d1e3c9bc5edfccc31722fb457712453c898fc88386d7210cc983528f643c1a49322064c09afe
-
SSDEEP
192:rrtgJqiPPmoRyRRR7RYcR/zRJRZw8TIrKczll8kpk15Wfc62xQ8JieM+xR0B3XH2:rrsqNakk8TEzD2ZYhO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1804 msedge.exe 1804 msedge.exe 1212 identity_helper.exe 1212 identity_helper.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 8 1804 msedge.exe 83 PID 1804 wrote to memory of 8 1804 msedge.exe 83 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 1948 1804 msedge.exe 85 PID 1804 wrote to memory of 1948 1804 msedge.exe 85 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86 PID 1804 wrote to memory of 4976 1804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2c7865da42df387940169d5f98e9b181_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4ff146f8,0x7ffd4ff14708,0x7ffd4ff147182⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,18229595835632328414,4786555449140408778,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD59e8f9f5b03d9a401bee2a9449bbc4e55
SHA12e2852fae421bb5bfad7ea7cfaee2c00563a1e61
SHA256579e693c3452be64b175425486ad23057c3682eddef1d1a2f3400d5ce1cf1531
SHA51232e7eec7a545f44fc0b4c95a4c633a03436869aa18693af0c43ead1de05d715a65dbe0f2e5faf8866be73acca103a08ee59703b45013c8dd1a9c0964936657b0
-
Filesize
644B
MD52013ba9d5616d978bd8a12439243e536
SHA1d3eed6ef608570da8b6707f6ac6a30fb3847f37a
SHA2565040b023db2b246b1fcf09d42ea3e1245db51e08dda9e7431f6e5141eb69a762
SHA5122c399c01f796b2e2e38e9abb50e87fc5f0778fdc367c2e6d9f8b00c26a00d5fd87e483524841033b1ec6b65dff0a17a7dedde5ba7d22f50a9bb001e988a8785f
-
Filesize
6KB
MD52b3db0762e5e75eecbfd2608c8e5960b
SHA10c48568ff4399bf3e16e12248b0e3250af7eb7dc
SHA2569aef8ca820a78386118933fab446b2ddc381e3236f012793718554f6fc1ff4f0
SHA512b5b313972343d04250e18b18839661aa8cce4aaaee6a79277bcf03253aff175657e3a079582ecf3458ffa1ca0093c8c51d298af70fb140ae8c2f637d187998e3
-
Filesize
6KB
MD5952ad9c7e31af0a8dc16c49e3f76973f
SHA167e0ac5dccca71ea3ee5de90f0aaf37d33ce2068
SHA2568c17a43c89ac9a50500c3af46dc017846a94b4218a14edf524f392f0886ec057
SHA512671312abe855b0bafa7e4cf69c68edc85e62219a27d62bdf729eab33fe35bb1f4b9b102ff2135f04bf9807763031c7b96bea59991a58e479fe1017d943d6e0c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54cd2079735e2d70a51680ec73e7ccb78
SHA148a367368bff988b95c90d1c0cbd82eb37e75515
SHA2561182688ff87d988fc457d3dd5cec9f01157c89b8d77bc076c3210b45a6fd8d51
SHA512046e57156111e1e9ea5f4cbbcd540cd243f88db6e1a6f2ac1f47af3afd3fa589b88d72aacb41cac6217950c016872fb14569df55cbb63ab3dca6fa015c20d50d