Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
fe6a74965eb2dd035be1ccb082180f8b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fe6a74965eb2dd035be1ccb082180f8b_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fe6a74965eb2dd035be1ccb082180f8b_JaffaCakes118.html
-
Size
49KB
-
MD5
fe6a74965eb2dd035be1ccb082180f8b
-
SHA1
d21349567b3996f4c3834143d574ed08de5f46df
-
SHA256
e6e031575784acfbd348fc82ee5a5d21bf880a673691e1b6e27b835c68e0b0cf
-
SHA512
4053fc3425fd169f8896eaac8c2cb19cfee40838dc233a65fe51ffc474491d2c1163a95c2441a67f998e6e3a179de9b7d25ab4d1f0043a97730406d821c7decb
-
SSDEEP
1536:/Blk/W/HJ2XYRcxvcrabdYzfuwz5mOuslS:5iW/HJ2XYRcxvcrabdYzfuwtmOJlS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 1036 msedge.exe 1036 msedge.exe 1848 identity_helper.exe 1848 identity_helper.exe 5756 msedge.exe 5756 msedge.exe 5756 msedge.exe 5756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 936 1036 msedge.exe 86 PID 1036 wrote to memory of 936 1036 msedge.exe 86 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4920 1036 msedge.exe 87 PID 1036 wrote to memory of 4048 1036 msedge.exe 88 PID 1036 wrote to memory of 4048 1036 msedge.exe 88 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89 PID 1036 wrote to memory of 2708 1036 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fe6a74965eb2dd035be1ccb082180f8b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffb836b46f8,0x7ffb836b4708,0x7ffb836b47182⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,16959964514685593888,15204099990612576837,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4644 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
40KB
MD50f81b6d61de3f11df96afa46fb362f45
SHA1b73925c797fcb5e23b0e0495ebdfb629d16f26e4
SHA2567171337d694e449b8c4923733effa4185a3eddb330b96e9fd0e4e3497faf5364
SHA5121c97e4e7357d385613f05f7a16439c25614d553cafdbd18a197c4a369726ec28b372ec6bed8b87a968d74a2585e3c999da9799e6cf558fa9ce25f87010d0e617
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5b6fc350b0ba8d56a75d942c4f10c7a0f
SHA1096e0b848eefb5841cb506cedce30291c91c981d
SHA256cdb6c974f2ce5a8f612222450d996fada3792928cf9f2fc101e6197093f53360
SHA512f7f95deaa03045021138e14694e6546d9bd4c6e308c85f22cec12aef05c234ba3902b7de47bf6b299793f3b9b064c6574531eb746187bf5014d90808dd262255
-
Filesize
1KB
MD5f61cc8564ea72023bb19db6ebe29ac1c
SHA1c37c5c041f571fa90e36f60c522b6e1418593b41
SHA25608363f0f3319b4f7e3ba327ffdd533924326b24bf94f1c6c223c46ab634ce677
SHA51280f5a74f9b9134ba77a3490c2b7894e09f037a6531d6daff48fb3a0ed8ba3fdc68cc8205f927ec3fd12860b9388a2444b4f9fa14fb90020f1dac9bd1b9c8ef68
-
Filesize
6KB
MD55adb7af8ea8c6371bf9d9f5e3c13364a
SHA156de54c668526fa70bd64dd16a4bdf5f82ff041f
SHA25634fafdf413d271af56d44f1e295f3822c90665dc1efac8599b6c3c56e1ff2905
SHA512c6a05865e04c2ec4a3d0718f9b91320bffea2858b62ad2ffe264d2f4a9bb45009d8bf0222cd6174563dc4847a6aa8bbe11b83436a58eb6618dbfc3440708b867
-
Filesize
7KB
MD5157836b6f78ebc9a589b53bf24a9e501
SHA12c1a599bf01c6f7d4bbe3f1ca620341df6398e96
SHA256a64b1ccebad9d9c31a81767d6f14ee381d4dcb7cb769b0ab6a96d78302b09f12
SHA512186afeb3fa06e28dddf085ebea1146c4fa28eb6e2c6f01aaa3f1cea7fd52ab665fac4a2d4b24ec07c8ebe5711f5a53c1370ef4b6f0ab7fd9b4179969283d3910
-
Filesize
7KB
MD59f51d3aca54a388cb57a514a4e3eb6d5
SHA1d95aa484bc0f21df8d41a07804c18665ff28b03c
SHA25679ac7523c6736c7a5d7739d38411afd0af5ab03765fbadbbe7cdbbed03ee3f71
SHA51262a3c175afae315b827f339b024693f44e735b32254743c10ea0319111bb9aa0c1a02a70abc85be6b6c5980d149dc421f350e596c472d21b47d00a027f748ba6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5abf680473696c3d55a74069a1a43bfd8
SHA1852906cb28a8be2b273947335536bb537ad6bcb7
SHA256ced74b2d0ffbe68e11850dd350f89621dad976b5025b2346e6b7ad021acf5154
SHA512bc618f6735539639ea1dd6715f44afafa5f0884eaea28a52d28a578a433e871465c3ad3fb87a7b331962aa3a51ed1d437de00819f5d069e245baeb3318f973a4