Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
55096b3720d0ffcc2e7687983b3a8596_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55096b3720d0ffcc2e7687983b3a8596_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55096b3720d0ffcc2e7687983b3a8596_JaffaCakes118.html
-
Size
25KB
-
MD5
55096b3720d0ffcc2e7687983b3a8596
-
SHA1
a82d436120e2f0d7e31bbe00705d8aac83f02b72
-
SHA256
a0f8e7517bdfe1c71e8df3e9ea7de1a7158e53b61474d89f53e01a5e65550fa1
-
SHA512
b838844b3f6a5846756d083f9b5e116094ba17ac1c58cf3b158d7bf3ddc39f8265807b1e9911671dc7aae92c05d82df75a7e8b68eaa68694b01ab2db792d1922
-
SSDEEP
384:kHcVP5dkokuQdR4TJO04DVh6DSzbXVYtGlFCVmJ2:kcVxdkoXZq3Rl0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 2108 msedge.exe 2108 msedge.exe 2756 identity_helper.exe 2756 identity_helper.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 216 2108 msedge.exe 84 PID 2108 wrote to memory of 216 2108 msedge.exe 84 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3288 2108 msedge.exe 85 PID 2108 wrote to memory of 3216 2108 msedge.exe 86 PID 2108 wrote to memory of 3216 2108 msedge.exe 86 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87 PID 2108 wrote to memory of 824 2108 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\55096b3720d0ffcc2e7687983b3a8596_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec26e46f8,0x7ffec26e4708,0x7ffec26e47182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2260 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13025030333601735846,12355601868705015598,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD574d87ab51607b074f17ab63679471219
SHA1893b7bbc9722b61de460193c71835d94b3fbab0b
SHA25666429cfd2840c44379e14eedcf97e40f161e164d678e07b58c9c6eb324001e84
SHA512f4587fb6f4dafb009e4eb4c78998e9b26b4177323887353588b4db1d8620281e759b0c9fd5cf3d1407ac69a283cf7c4f4b0ccb2e9f0c214b0f3c53e2697518d2
-
Filesize
1KB
MD5dc1ba4226e1414a870635a63d29de36a
SHA1e4f18dc1be455fc0fefd5b8bdb4dbcca7717905e
SHA256789c7c89c0d58c231f1fa92b3ab24a49c4324ff94afdd148c06b904bec24b7b4
SHA512f13ee3cfd6972f519a898556b63deb45481b296067db6eb3c191151bcfc8526b6c80331a2bacf799fe071bd2504954be47e00f69cb906d86662d960977cb1d29
-
Filesize
5KB
MD5022fc0097c9df007ec65fc944f9cf892
SHA1ef21b28014a8b4eb1eaffbfaaa3643e206160be3
SHA256288f383c56bc83888e42ab185db401ed852c5154a2b1f394af752bd08ffd982c
SHA512cfda42618d3a3d32fa5ab5705854afaf253c2cf81e022cc56342310694ecc14b251a370bb852dfe1c1f80c2f9cc91d03d01933972df0196d9cb3d3d77c0d131a
-
Filesize
6KB
MD5c8ec82ff93e049ebd80a4fbed4c1a11d
SHA16600c4b8adc230dbfc53608fb6b6d4f32b55dbeb
SHA25641780ffc41d14dcfbaa5eb0daabecc18c7b74bdae7a50fc5b9b2b615ca913001
SHA512f748bb31cc811318458c841f99d4e52fa350a69ba3bbcc3e5166fef2cd59c23cd9b6d858ff40b637384d2cbb576c6b59d9fd65c58ff281243dfdb4b30d181fcf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD531f1e6efabf7f024344aa0de4ed01f85
SHA1c3734e40d49bf80528f16daa9ba050ef1bcc324f
SHA2563a33a0846ef07e278b1aba23daabb6b89ddb3ee8d8fb4a0636197a26e1c4cdc6
SHA512f7de092ee9f8f3b34647b167fec81039ba253010056014eb276ec2c5a5f9aa6c12cb45524a881094d6429f7334bea142f0f5e0c6441772198c4e9da5bee9d617