Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
576a5630ddd52c29b014d25824496f26_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
576a5630ddd52c29b014d25824496f26_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
576a5630ddd52c29b014d25824496f26_JaffaCakes118.html
-
Size
25KB
-
MD5
576a5630ddd52c29b014d25824496f26
-
SHA1
f87c6325baf323aea07badd2aac2d7f69f7d0f71
-
SHA256
f53e1cf4a882ec2293ce9f41cd168507f5551d73183476111d38e19e33b363b6
-
SHA512
cad4246ef4cb2b328d432c63a5bad39edd53c028b61d60ea241487c5a9944478e4ec592c16528b8298b9ecb9fc689c0436162fb06b70b5e74fa57337db1bf982
-
SSDEEP
384:MBuIqdI0xvkv/d5GpFKLUKoefqT8r0qAvEECixBPg:MBaaFyoLUKfQ8QPvEECixBI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1836 msedge.exe 1836 msedge.exe 4148 msedge.exe 4148 msedge.exe 4248 identity_helper.exe 4248 identity_helper.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 1352 4148 msedge.exe 84 PID 4148 wrote to memory of 1352 4148 msedge.exe 84 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 4864 4148 msedge.exe 85 PID 4148 wrote to memory of 1836 4148 msedge.exe 86 PID 4148 wrote to memory of 1836 4148 msedge.exe 86 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87 PID 4148 wrote to memory of 4696 4148 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\576a5630ddd52c29b014d25824496f26_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff094d46f8,0x7fff094d4708,0x7fff094d47182⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,17346179720138215746,6693638717077768763,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD55962361a239c2849b101210dab0d4c5c
SHA1b4af2862ca5333cc77f62de8125c1681c14bd8e1
SHA2564b3e4cc38ba99efa6d8de22f37287fd4f8e84d0df1b8587fac5732e01b44de6a
SHA512ed2f003d9490eee82718532df74a8f212dbec2350233e7b546dced8458f53a05e7a83a6f766823259e9f89e86e81b2109edbc2dbd7ff0f1c6bf2ad646cbdd3f7
-
Filesize
644B
MD53dec5510968e22874c0c165ed7c48054
SHA1a2b89e26511771b459176fa3ce213278485644f3
SHA256afba20ca0cb7debf14a6b25d28dcfd21a8307cdbfe6c07744db8079fe4ca54f0
SHA512ac5ab0fdce6aa9be02d11c08819cdc84b5e931eac11430d9c426a5edbc5d174dfdeeee9bd9b6b6dcac3197fd9b094fdf47c1043bb7cb8d7f2c7d37ed76488e73
-
Filesize
6KB
MD51b71fbb2dfe98ba5af384d844527a3f8
SHA122929d8e75ba0a7bae757fa3b092af89b56618c5
SHA256b00be3f5ded7a5c0b0ff611b192daae4b178af89c01fd00e0a4c7e6771ad909b
SHA5126bc624e9e3f09c588556e3356b50c7937cf5cb978c1c6dfc35daf696c90d8b6638c252360a4d189165393da7022bfdebe0ec9622fbe0bd88d913c7a2f89c0870
-
Filesize
5KB
MD52f7906c47ff4c0a6665f90deca0c7e61
SHA11875eb93347b33e73bcde07a373788f7fbbcde2e
SHA2560e84456baa1f10d52c2d947a5473fffe00c89a836cc1569a4f1273e8f659ec7c
SHA512f3b9a82eb84d05e43871f657b17d2409935b46c8fa9fc109a13bd585fa9b21e268be169c73b1f74db01312b42ee428d65a67922e834507c4246a836e122e8efb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fdb6b7b9c438c1a47567786251ceac6a
SHA177e65a719854893c7e205f6bb1fc24f81c5bf45d
SHA256150a006e2d4810a1ea9ebb51185951baa3feca096b76072fb7977b069dde0318
SHA5124516aee10c781a5d28fefee57d2f58baa3205af58d59fc813cc11ea5cfe7369417430c857f1909ad28cfa371a7963a6fb5627b3cdf1c5af341475bf9f8b62f19