Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/12/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
f0e0110ed12bc58ae54697ebf3cecd59_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0e0110ed12bc58ae54697ebf3cecd59_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f0e0110ed12bc58ae54697ebf3cecd59_JaffaCakes118.html
-
Size
177KB
-
MD5
f0e0110ed12bc58ae54697ebf3cecd59
-
SHA1
32d9638c6f609adffcd0739d77f24cd1b4d7fda4
-
SHA256
9284d8ddd130a7a45166d9066f2db238245dc34bbf10faf18176428ffdf14193
-
SHA512
6db583da789e7c0723f42b0a562ae9e06f548012810f86c2cf2de612ca212db6b92bf7f0cbd1981f70070d0769aad0f51e80b24d1e253ee3e88eb077db191035
-
SSDEEP
3072:UvxjvG83mbGXmNJUB/gr//ZDsbE2q3iv14FO:sNXmNJMxq3i9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 2816 msedge.exe 2816 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3904 2816 msedge.exe 82 PID 2816 wrote to memory of 3904 2816 msedge.exe 82 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 4556 2816 msedge.exe 83 PID 2816 wrote to memory of 1940 2816 msedge.exe 84 PID 2816 wrote to memory of 1940 2816 msedge.exe 84 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85 PID 2816 wrote to memory of 4780 2816 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\f0e0110ed12bc58ae54697ebf3cecd59_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebdd546f8,0x7ffebdd54708,0x7ffebdd547182⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1940 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,1048959084078434026,8729031294486435559,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD54183994b97fa199ffb8f5d510c9597f7
SHA14d04109dc4a9435b00b65c4c70a217e2a0bb5da2
SHA25671a2654deffabb0634e33edd504e2250453537b2ee6e8de2a6117dfe2b59ad21
SHA512a4fcfea8dd37735c8000225ec4f30d28fdcba48ce0d57be23c81a36bbee51ef2daa9671c05e8b93e5391a02e5e46513863b074ba8d5e76406e306f63d40430bf
-
Filesize
2KB
MD523a683f43e78b51e2decb3b2ad9e8f0e
SHA18de2f1a0b4b2436d4f7b092cbef4176d79a6b9a8
SHA25644ee66b4f886c11277af439872cb56d917fd34786b18ed2907372f6f3b9dcf16
SHA5125f1ac043704944b1fcb65d3e0ede8ffeced903c064fa7b3434fa14a83db99f1f816efc133b66b0c5b16f0a6a5e6c06777afd353d0fd094922251627ea983bb35
-
Filesize
6KB
MD519bca6a92d0a2e3b65283355862627cf
SHA17922b1c5d145effd00a1de0408083bb47211af43
SHA25634877249a663148da617b2c8fc6638a86c8d38c3610da2d13a68aae942c5a86b
SHA5125ec8e4905234103b5d39077352dfe6f8bce3c41d763b77127a6dc597f6314946f9001449a114fd72a69bdffb9878ce529ae1610684fad299564762471e0e9c6c
-
Filesize
5KB
MD5bea551bff414fcbd91e45f70be123842
SHA1663080dc329d8ad712ef69606a831cc65dbc275a
SHA2567fe8eebb7e63c099e46f21e4623223dafa00f20fc2fe55c785fb00cf06f2a73b
SHA512adbe7f8d30e5ef127739818f78451d817b92328eb210b39a3104c6e3ffeffef11cd9af7b5fa5209d85ffb3928e549532b7efc7c596325b6852d91ed1a72cfe4d
-
Filesize
6KB
MD557be887ab191d333c1c7b0170e68697b
SHA19388643893c0670fc8a25295857467db351b9fd4
SHA256eb87808fb282454af7942e1af3d30d02f08d3e698efc6204a2a65f9d2e64d553
SHA512a74725f9cf3e989e029074a2a5ee197f68e6cac8664742a6612611df05cd077f0c84574ba7146889c6c52f5ef848e91350b120f5a29b75b199aed4728102b434
-
Filesize
6KB
MD57837c4d5f65b78c73f31d707c2409c88
SHA14ca1740101c03f5430c89b5986dc0c20acdf9a58
SHA2568bf64831340b74056fdc1d91b64a9af3433790c912905281b443eb6c800bcb71
SHA512191cc125b085d0be36c50a437328143999a791fa8ef569a4376fd58058415a5cc4cce894f322f36232c55a370386e7fd9777c769ab962f0700c940a4524b9cd5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59b18ea00274730877d00660f2f355e88
SHA1da8840fb2f795933bba46fb0b8bd9154d9cec73b
SHA256df254cdb51574486ff7106f231192f3caf009367a4688f7917ccfde71a18f316
SHA512cfb337ea4400b9192ae81765e8028fe026276bd4ff8f60ca4eeeac091a3cd3cd1b0dd5e52cb3e3376dd76b51d84d050243782d28597f4b06595e6c43ae076ead