Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
ea18af083d5850b4593bc2659239b446_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ea18af083d5850b4593bc2659239b446_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ea18af083d5850b4593bc2659239b446_JaffaCakes118.html
-
Size
25KB
-
MD5
ea18af083d5850b4593bc2659239b446
-
SHA1
90af63d888527c3744bf1b94562e5a1838724169
-
SHA256
6b1bf6226a8980cf82f8ba3f51becaeecf8fd43a5f1d28a676e36e195b76d89b
-
SHA512
e474ff2714bf1df9135bd9748285ae4f233e635c7eb4e5a7c9f98b67d43c9ee1f0326e0c6f259a1a9a681c0830e79df107a73d014710b4e1299676e3c5cc3ebf
-
SSDEEP
768:/RXf61rpKVAqnd+qq9o7B2VGwI49pL52SaA:/RXf61dKVhnd+xmBKGwI49pLX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 1960 msedge.exe 1960 msedge.exe 3476 identity_helper.exe 3476 identity_helper.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 4012 1960 msedge.exe 85 PID 1960 wrote to memory of 4012 1960 msedge.exe 85 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4500 1960 msedge.exe 86 PID 1960 wrote to memory of 4504 1960 msedge.exe 87 PID 1960 wrote to memory of 4504 1960 msedge.exe 87 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88 PID 1960 wrote to memory of 2268 1960 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea18af083d5850b4593bc2659239b446_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbce1d46f8,0x7ffbce1d4708,0x7ffbce1d47182⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16956124313974557722,13989455257913005145,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2ffd200d-1d4b-4082-b8a8-f9d7d0519e94.tmp
Filesize603B
MD5492b57398cdefc3e3e84aa8297287f7d
SHA15595223ad2df10f65c2663c458b5821b0d58bc0c
SHA25685b88930ad94d2b9780a294ce31f1acfff319929e1ab7fc4899cfb86b162e699
SHA512c46b4eec2b581ce3ee34655c6dbdd2571043bcf3cb22748e3440a7efec043a35c06a3179ec5644d7e42018bef2968975b77a9613f7846a46d32afb1d9025566b
-
Filesize
6KB
MD5a3249803c34f4a5e555f1df3b3f41c5e
SHA165372261393a6b19964342f8cf2d424500b5e400
SHA256489c20e9c1e1439954e45c916695cef736ca2809338e86c1f37d1378d1cd4424
SHA512c8363d726a8654822359662457011029bae31641ed58f51f329e1c680d7f9fed1740c01c4bf00d84f4325d9cc37e3b0631032c22f00fe5535a0d7f9774589a3d
-
Filesize
6KB
MD5ce6e9c28c03836e1aa2364e3242983b3
SHA1fd5e266372d325abc00b0a00633543b7b02a2fb8
SHA256a5d3b9cb97f7075aaec6401c6f9708843c1488c6293c42c83cfb14e9888ad8fb
SHA5121e9cafd482a478899f057ca39dd2da78694e3fa7069fc6ef4e422473fe80100e77410f5f399195eba512800e8f5be7ab9e8fc08fddd1b285f73418748f010e7f
-
Filesize
6KB
MD5c810177a2e288b618f1cc383dd990f23
SHA15168e30a385409d34f98bda51a35442118c61144
SHA256f6bbab854661b2c0886b015c4a7f81bc3101ac3966d9a070d733233b31ff45a8
SHA51298279773acabfc561b7d86f408c668b783ddbbefde90e7299e3ac7a7a2eff9d2d8a490740b162a2533c15aee86c661d576be4c3ac0a56a82695c6a5ea41a4ed9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ab92b3f3d725acf6dc96f48830f739cf
SHA1beefc7fe9fd5efd53eaeb8fa966a1bdb36b48ad7
SHA2569e68747c3dfeb753b99351944105cf9973446caee99e7d43fcec12822f0f5065
SHA512513af81fb643a4f3f7a4a4181bcad7bca25327fd1e0f633c3ff8f10712cefc02eee8f30c2e41259f23dae62313db258a41c085907d534e8321594d90d73c9d10