Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
424afb6fef41c13ac98588f9d4bb7539_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
424afb6fef41c13ac98588f9d4bb7539_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
424afb6fef41c13ac98588f9d4bb7539_JaffaCakes118.html
-
Size
12KB
-
MD5
424afb6fef41c13ac98588f9d4bb7539
-
SHA1
1b3c0f408f64635348e195936ff83c9d357967d3
-
SHA256
9d69b5bd3a9a22d05ef1f125dc7b9f0c9e5933cf00c0c7a574e6851bbdd27f19
-
SHA512
ce5c26b4fdf30d2dab4c3204e01d6124cadc15bf6e7c391bfa0163002c47b4bab81a315475b56a188919f58067ae3565adfdff39a69d0676bfab0fa6a83d159a
-
SSDEEP
192:2VdlIsr0KXyJwVC9N5tu8k/w1wvqydBeZ+nyXluV01JauBuLbdU8d:sdlIcPVCjt+/gcdBeZ+nyXluV0JaguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 1940 msedge.exe 1940 msedge.exe 376 identity_helper.exe 376 identity_helper.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 384 1940 msedge.exe 83 PID 1940 wrote to memory of 384 1940 msedge.exe 83 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 3528 1940 msedge.exe 84 PID 1940 wrote to memory of 2716 1940 msedge.exe 85 PID 1940 wrote to memory of 2716 1940 msedge.exe 85 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86 PID 1940 wrote to memory of 2380 1940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\424afb6fef41c13ac98588f9d4bb7539_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0a8746f8,0x7ffc0a874708,0x7ffc0a8747182⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6747648600209333777,1230794681228573820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD53465c4d689ea176374b2e877a031ff97
SHA15454d4212f55a54f290e5f958a3f9971e8436588
SHA256011eee4827f17b8d6c315b8e956b401ebf9f6d38b62bf083ca53cd1d83e74d85
SHA51210658f9d069cbd8d43a6b90987e8e680c3d0d2daccf8bb4ba6c0b9c5e8d6c78acb262e6b761a4af0037dfb33e0c435472f813e3d9420c9513c98c831b733f310
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD595a8f396f30bd094537f06c06b59b4d0
SHA10fa066c4651431b22b6551a2648bfdd1804eb757
SHA2562483549037e63c21f1033c686bbe77c0505282fbe7b3847de61cd94c9b79a87b
SHA51221d2995ca4188d671690d0a99688c5cc41af2f66eba8030205ca5ee11bdafcab3e8c1cd7ca5d6dc55e747a6fd5a527523bef920091a7f03a2b2fd5a984244163
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5239781f954063df88804767e0f4dbce9
SHA1e86e4fbf6d0fe15af0aa19591c620fb522bc0892
SHA2561a11ba2dc4063495a686591aee7aef600e56dfe863dca886fdcbdcfe3c73bc22
SHA5129581ea2025980c86ad3051c78d7a3ba9e419120fb14f89f578c958cfd0a0890329d0ca7e4ea620131d4740194b25983a35644152d9f68bf5696524d913632713
-
Filesize
6KB
MD5d67067b796352d0278b778b6d179550a
SHA12fba2905071938a18475498e6963ee9accc792af
SHA256a68a218b19635e5fced47a58cf2bb756d136e3195c0a5327a5ea715c87e027b1
SHA51246a38173cefa0c5093c543d0aeb0c2885cc19171a8daa55cea062f6de613f89449ea355b150a791cb7114591e42e6cf44b0bd79409214faa28edd1940d4a05b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ec4bf6e211cee6709b4db871ac68fd95
SHA1c613360fdbd93b5cc2bb54cc3cb0774fc7d52f15
SHA256bd5edf3d7798b5b891f765da0f5821eef51a262d7708ae9d804bb6e12a83ea71
SHA5126e78995e01bfbac7749a96587813ac1c8ecdfa82b72754ad7bee1137e534cffaf77b88830cea8d9771bd5d46230c00ab367485191155a1c5b4b37d05556f301b