Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
f53e080e75b50929ade89d4f120efbea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f53e080e75b50929ade89d4f120efbea_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f53e080e75b50929ade89d4f120efbea_JaffaCakes118.html
-
Size
432B
-
MD5
f53e080e75b50929ade89d4f120efbea
-
SHA1
6da9e7635f4a8fc2f7ea39c7a23449c279d4e77a
-
SHA256
365013b65149f68d29535d3d5d7a8bfbd85d37cf3e44c305a3152725a6327bc7
-
SHA512
1fff8131d7430ad1c7ffec6b98596fb018289583573625a45d45dabd7d82568d36d6e3b95cc468e9e8b42ca8fa1cbdff93be64585ddcfd9c69a12f3e39751d01
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 684 msedge.exe 684 msedge.exe 4576 identity_helper.exe 4576 identity_helper.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 684 wrote to memory of 2472 684 msedge.exe 85 PID 684 wrote to memory of 2472 684 msedge.exe 85 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 4820 684 msedge.exe 86 PID 684 wrote to memory of 1216 684 msedge.exe 87 PID 684 wrote to memory of 1216 684 msedge.exe 87 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88 PID 684 wrote to memory of 4980 684 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f53e080e75b50929ade89d4f120efbea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8337e46f8,0x7ff8337e4708,0x7ff8337e47182⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2135718941213253326,18421815127730068081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD54698bdf6ba43b33f0f3f76864b6e7786
SHA1af3da95e1ac8dd758546e676982c735f3a1ada0e
SHA25692a64511dd3ff9f4e7b390f25add1ad2d3519d4978af5ff7f2fb131990662c4f
SHA512ec5c82b766faa75ded0d836da8ce1d0862320e2077a8ea83edcb9efea953799f3491428afb3c6397635e4d025dca8dee51072c71f356c638f0c21ebb5b10566e
-
Filesize
7KB
MD5e991890a8c9cdfc5b041f7d186fb5110
SHA1bfdde7faa159fd2c292592b5938891c43c4a7b64
SHA256ad824bad7e6c96f0d36d620944571bce18bfcdc3d7e9a3022e7d713dc38715e8
SHA51267b61c991dd0bde7293952caf2cdd49a68b29b52eab11850f8d332ab0b8fdab06b370661a2abc9be1ef325e9381529b3d5ac6517aba3d1acf07c2eddbec7c752
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d24b3fa10afc0533d0f468a22eb15264
SHA1ab05f90cc78a2a5a7fb4d187998950b5f8c2f2bc
SHA256fde00e885735ec058210900e851624032b1c488f42eb8532baed2e6dec42bc6b
SHA51256b7289e407bf8e707f53c4936e3deebb9b1e1b06d238a1d6bedf9af5dfc0e83f58976c218a23f7b4f07f8e4cf8ff7348f0b31ece70e9abd6fd34e1975fce3e0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe578b0a.TMP
Filesize48B
MD51296df4c8e15f263315634ad374922f7
SHA141000737241a312f439c5d2097f32c52742adbba
SHA256ac498b3a6bed7e92a817df9b81e5a27b9c9a0472e65d5a49971b90dda8494659
SHA51268ee8c14b531cbc7b3cf163496805ced6f580f7433f1fa03de84e149e405f88dd85bc645a8cc2b2c5b86ee7a1c75163fc9dc1e28b92915e5a2012b0b6e0dcf48
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b7f33c719849392effee381b02477ebc
SHA1429e769f85046d5d0a275541d1f67782659ee33f
SHA2568d647de0e2e6f942cca1611f82d5303d0b364a9127fd0f17ae27c1ae22eac325
SHA512b39e822f54a7575f80572451c3a7e96aaff060440c7cdb37b0697818c66279e9bf5afe5df8330ca7c254e4432a6fb17a6be5806740025a03e889ebbb71c176c6
-
Filesize
11KB
MD5926e2e16807dc6e4fa6788fc4e29a2b2
SHA11a2457732fad84824ae2045b88be64388145765c
SHA256ecbf63b70405580c9b221a83244bb29e7947d81941d85bc354a6f1fe5181378d
SHA512f73f37880cfabd2b79c254fe5fecde4c7080f9fdef50ad1441d6dd43b21af3ff4af33b2d805bcfaa221afc2b8ea2446a21202f28469b8af655a33b36967fa078