Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
43ff933d93d874a553d66bb0a61ea16b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43ff933d93d874a553d66bb0a61ea16b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43ff933d93d874a553d66bb0a61ea16b_JaffaCakes118.html
-
Size
20KB
-
MD5
43ff933d93d874a553d66bb0a61ea16b
-
SHA1
9a9a7cbcfe376e9c862d7ce1267b574745463947
-
SHA256
6337d1e3daa7047a1af6601757252c7788abb7b1ba09d20d2ffd10bbd67413f5
-
SHA512
372ca09868c8390edc23d52c178ef8ce7eafd8929e0fa731115677c614ef62fc19ac4579021dd21edd5d7dad8c23a77380ddb18d035cd41a2281babb55127fe6
-
SSDEEP
384:4+QfPFd9QZBC7mOdM958x6puKfpC5IgSnbmFe7AckG7Xjces6D6pT5MxH1rPd:Zcd9QZBC7mOdMYupC5I9nC4DNPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 984 msedge.exe 984 msedge.exe 4108 msedge.exe 4108 msedge.exe 3388 identity_helper.exe 3388 identity_helper.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 2844 4108 msedge.exe 84 PID 4108 wrote to memory of 2844 4108 msedge.exe 84 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 2848 4108 msedge.exe 85 PID 4108 wrote to memory of 984 4108 msedge.exe 86 PID 4108 wrote to memory of 984 4108 msedge.exe 86 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87 PID 4108 wrote to memory of 4192 4108 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43ff933d93d874a553d66bb0a61ea16b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe649f46f8,0x7ffe649f4708,0x7ffe649f47182⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4384 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,940129964380683428,17735489515736633088,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD544489b5474c20f8d40313d05288a7d31
SHA19ba609e16d55e9d81e1b571f08dea3bfee0b0634
SHA25613a75887a60f2b57272db3555e2fe156360b4fb8839ad19b46a4fd29fe5368a0
SHA512923693dda1980a80035f0bbe4cee56d850d469e82b43772f84af6ec95adaef047455c9d10ca2c39d59bb8f249d6ea876737a575dede8ece6459942ed84815de7
-
Filesize
1KB
MD51960e4a273abc71a80dbbd72ddc6bc74
SHA17266916fc7ca0572ce8d45c25f95f9f495a62ac3
SHA256cff415a84370ae81e5e879352ea239cb3a05dd62690aa3d7d7fd973de15f76c0
SHA51253a5c43679088b217ebcc1e6b7255cb3931d82f3540143fa3cdb7baf0c5fb681be423e0bce7054bc05f5318c01b8d080cd911e8a1512f9563dfc84d626cb2d40
-
Filesize
6KB
MD59eb6fac2ca0656f876c853fc96b733d3
SHA1e1c5c0850cb48ca9c6d16fee89928904eaec6967
SHA256bc1ac49ca268202c704f02cc99373aa4af6278394a840c8331cbdca6d44da0d1
SHA51263bdf8a118625358b98f31adfb639f06760f42302cf0ef906d42b114d197846a8f1e0a24e8e5f76af930c43303b45f250663466c9f7ee104f68cd86fb0de462e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f9919e45-9f00-418e-a924-c80b8eefbb5f.tmp
Filesize6KB
MD5c6e66e2b4e39405df89660bb2bfde9f9
SHA181d430aa8bfe1405904d8df067c163e65567981e
SHA256387b986c7e76f3c8be8808112e535c4017734f572239548013fdc40260fe6aec
SHA51259fc5c7a1445bd197d74bea4a1d203cd0e50bb537ab40df8752e209463b7cc6df7e77c21222d838c4cd976989b6c911efeb51639c3ea454e8b28f190d77ac2a0
-
Filesize
10KB
MD57d9f935df32f433970041d6018186a33
SHA147e9bb2d5b7fcc450c7ed37536f7d9078d71190d
SHA256d7b67cd89bf8f1a336ed02830ed976688be352188dc0eb85271dec6468b48658
SHA512d7567ea625ea14fb91acf4f8bafea3fcdf49107f8d6dd9c7216bc8da61c291851ea8dcd532e81dd4f1ef888380b5291c4667a1a3c60e498a4ce0d6dff944361e