Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
07ba04d779f98ba850eb78bbc5286ce1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
07ba04d779f98ba850eb78bbc5286ce1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
07ba04d779f98ba850eb78bbc5286ce1_JaffaCakes118.html
-
Size
96KB
-
MD5
07ba04d779f98ba850eb78bbc5286ce1
-
SHA1
10cb7d92115f8b5cfa38a16253fe945567df9622
-
SHA256
c91f9df388cc59105aa637f5dfba249fbdfc3dc1028ea77f42ca4d1adfbcd82b
-
SHA512
978e0bc4dbc5693b5edfed9a6693e8f0be9f10f286489ab90ad54f1de0e51f70056263dddb5af412960939d8d4aefa3954b615173ae71201c119edffd75f247b
-
SSDEEP
1536:qb4Q4wb+5QgRjMh0u1Yy5agj7SPXppy9JUwXIGDG75w3TO2yBnGb6gZLPetRYIpN:qbYtjd5F
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 1628 msedge.exe 1628 msedge.exe 4204 identity_helper.exe 4204 identity_helper.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe 1628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1920 1628 msedge.exe 81 PID 1628 wrote to memory of 1920 1628 msedge.exe 81 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 5012 1628 msedge.exe 82 PID 1628 wrote to memory of 3612 1628 msedge.exe 83 PID 1628 wrote to memory of 3612 1628 msedge.exe 83 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84 PID 1628 wrote to memory of 424 1628 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\07ba04d779f98ba850eb78bbc5286ce1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab34646f8,0x7ffab3464708,0x7ffab34647182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10982082533922157313,8361811933202225350,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\91ceeba8-6464-4307-ade0-7d3f922508a0.tmp
Filesize6KB
MD59bb36955539e3c79d3c95feb6f1c4c10
SHA191161eba788ecabcd593d285fb0fef70e52f2a3b
SHA256e75aab8193ad638e12378c16fc5bc4f74939342d7026ea733aa8aa849ba5b27a
SHA5123ac3490e10804fba9bd7b3ca73a87b351c8c8537818a137069d596ef78d84de11edabd81bf7fb2d5fda45c2deeaec31bcfc02fba3ec2cfaea30cc71ce721981a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD55c78b46c8a2a97e2cd0389dc9aa1c177
SHA11027eb1cf9ba3968a7283bb20fa62f8d432458d6
SHA25686d8886f367fb3e5d5bbc31b3abd2bd80bd0b380aa0e7790115bf59837e6a47c
SHA512d262b8343b5f047073d726ff1cd27f43376becd09a398f92abc03e0fa4f9bfc7f6b17573c3a3fdcc2f2543a4a7a0c6d7c95c127ccb89a5663321dc33bb60cb5c
-
Filesize
3KB
MD56dbf274904751ae08a8cf2de677d485f
SHA1a5517f354447e445669a739d3d5c26146a59127a
SHA256e1689cc422c0498965e68f4517f55789d3c987ab51ace82d05a98e69dafc607c
SHA5120e60711a4f007fb74956be2804f56f5f2776a4d4ab0a8b022b45534880647ddd0fc62ed6dbd1a243a2c3a1cc5bc8ad4694dec1c5c461163b47e0850e638c51f1
-
Filesize
3KB
MD5def3206438635eb64f75618c724ae423
SHA1f5b83e35cf5494bc2247a4ff5fc6911c54d05e66
SHA256bf07810b5d21bf14f7f7ce5dd6c73a25ab62d83a935fdeb1d69415016060cb82
SHA5125f745bd283537337d56a4ff21d495421e7fa9df905155f75ee884c6db1a0c9019a461f484958b6ec09ca24fb7be9d3dabac87e3168b1895a35df4cddde707f1a
-
Filesize
7KB
MD5f393142500947213f06f46b1444cf32f
SHA1b7520612b2ba90dc74ad17fc2a6862bff1b6472c
SHA25606ef66f01094a4fc0ef4e9c1c54eca10af4923ffd48f2ad35363963fed3f7d2c
SHA512481b6e4373e012943f67a07b28d47a8b61b621f0c36125c2ccea448c29dd5d905131b8d555014a6ead74d73996b7c09bd94bb9c3e951b2995409615def090ccf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6e0b8e8cbd3d12c36b486db2d32542f
SHA15ae704c2d9ce3eeefb888fa4c33c9258e9512dfe
SHA256c8846c67af8cc528c6ca4f3339bfc3a8eaa116f7f449387bbb6eb913a576ff2f
SHA5125c17d5d02c49850a29e9dcb3de3cb513a51198b2ac08818cf541f0e5325faa25f6565a33fbf90eea7e51f6e49fcf5dc17687c9816e2a9cfa5884baa5557dbcd1