Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
15b888aa8c066dce1250e00fad4ecd96_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15b888aa8c066dce1250e00fad4ecd96_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
15b888aa8c066dce1250e00fad4ecd96_JaffaCakes118.html
-
Size
72KB
-
MD5
15b888aa8c066dce1250e00fad4ecd96
-
SHA1
81137687c930d407e03e0a34ce9d6ddef6bb422e
-
SHA256
5c00f76fec2e0d4a7fe1d58826141d3f935972f1865893bf3e729717dc3dfbca
-
SHA512
4980eee3584698ca2d73aabe8dadf97a198ab3c4463f82918aafcbca14c45a0584339993169b0aed5203c867760c61ff96056348050d92dda936ee54e104489c
-
SSDEEP
1536:+ap/nq/2OFoDo0kUKVLc44cjwX8vFpSr7s:Bpvq2OFio07GLCcm8vFpSr7s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 316 msedge.exe 316 msedge.exe 1712 msedge.exe 1712 msedge.exe 2856 identity_helper.exe 2856 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 4064 1712 msedge.exe 85 PID 1712 wrote to memory of 4064 1712 msedge.exe 85 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 2240 1712 msedge.exe 86 PID 1712 wrote to memory of 316 1712 msedge.exe 87 PID 1712 wrote to memory of 316 1712 msedge.exe 87 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88 PID 1712 wrote to memory of 212 1712 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15b888aa8c066dce1250e00fad4ecd96_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffa53fb46f8,0x7ffa53fb4708,0x7ffa53fb47182⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,392203540285548669,7460298715459261248,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD55f2c2449d44dd58dce9b729100d6ad92
SHA14ae2c880aa0aac997bf0244abb0b1359e84e199c
SHA2560b82a06c1ddb72d1465478c06c9ef12654bfc60f84336300b7150bd9b55f8b22
SHA512c4e9dc70795fa6cd3c0fba50ef4bc424a0218a4c75e60136f1fb9afc36f41a8963bec459046c0c1ac936a9954350f269ebb141ec02ca8699ccb6c538789cc7d6
-
Filesize
1KB
MD5d362c44072fc4857ef598a866a7e359d
SHA1e53763a694a6e0b3c24225b4a9e253251f6cb981
SHA256dca516c72535e9978cdcddf21289db9f6631609c40a57ee4c5c1eb30736cfa81
SHA512d0959626745552637f0b9191c19a2acec050b898a1dbbef41324829e75f6e0c8701f981205670111fb898fcc15717803f913bf5ffd972ac717d9c9e7ef6f8a1d
-
Filesize
6KB
MD505dbe67d97bcae58f0891f67e6752180
SHA1cf67aa7e25826e7083640a0100fdb02c6d1c2440
SHA256a9fd4980e428873977d10615872f0a1e8d2b8aeda7c7e2ae28d0f43e2d5ede41
SHA5124c630ad5efa8ee850ce1a6d7276f2002f64fd7beaadc25333ba022ee745f25e993d4f53078c77b89276bf55ddfa3e54ddb75fdb32c4a48b25b591ea1ad8fa4d2
-
Filesize
7KB
MD5f5b28ac892f10e949a159c258c9f9feb
SHA1bef03041edbe524165672a7e49bdf4db2c2077b7
SHA256b05336f25d2467453ea2e26fcdaecac6a82d01b16e54692764b5619ee7a3d81b
SHA5123dc599a6270e8dd9c987cc0118885793d0b17683cf52ecd865f5ba3f0f971c62cfb059ca8cb6a8fb292ea6092481a2291bb648b63ff42806c90cff85f8f02de1
-
Filesize
7KB
MD594db5c4ddf31be176f755e9f513729d4
SHA19fcd2224af715959574ba973f3b238c7247ec507
SHA25652aa632c475deee6b1a47157234a25dfe412a1d1ea21112e833ac5783ddd75fc
SHA5126bb8ce8e1476cbe2c72418a96743d3196b41481373de6dd2b29546e2d3b60c341f6120e45e517c0948a77f4f1b44877f365bc512b5a77e336c98bb8c3bc564e6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD542e7e088aeba223f1c95e7e504198679
SHA1c25cabc08d38335c4e061ef173368e71bb4189e0
SHA2569587c14fbef47b7f29b2d803a8bf7ad5a8466e8508926d1e2a5164b69a37c4a0
SHA5125cb76c3ee64512d710327b72d559715a594288f242c4b5f7b6085094a654a9fcc27bdd0c1a35ce821db32e8cf5b7bdce9ed544c9083ac0fd0826ea8ce5d63694