Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
11993f9e1659e014e0261fee130c5a08_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
11993f9e1659e014e0261fee130c5a08_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
11993f9e1659e014e0261fee130c5a08_JaffaCakes118.html
-
Size
35KB
-
MD5
11993f9e1659e014e0261fee130c5a08
-
SHA1
2168fb841895153d15b0807b906a6bcefe8c7303
-
SHA256
d788f582379ad400c6775299422609828f3c25a9fa5b5dbffdea0ed1c661d14c
-
SHA512
2539defb30896c7775f3b92e6fdf1c437065b449ac8a71dae2e78e71306bc925984f4c5a0a52340d700190e8e0c5db7e277b4d4af7178be2d4e1481f2e286661
-
SSDEEP
768:K+5BsJry2v3trl97WQnM9X/6QUWxuHh3GNDU6Rx:K+5BsJry2v3pl97DM9X/+fINI6Rx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1068 msedge.exe 1068 msedge.exe 624 msedge.exe 624 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 2096 624 msedge.exe 83 PID 624 wrote to memory of 2096 624 msedge.exe 83 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 4052 624 msedge.exe 84 PID 624 wrote to memory of 1068 624 msedge.exe 85 PID 624 wrote to memory of 1068 624 msedge.exe 85 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86 PID 624 wrote to memory of 4256 624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\11993f9e1659e014e0261fee130c5a08_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2df146f8,0x7ffa2df14708,0x7ffa2df147182⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11948253611376768187,3508926695781927897,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5a1844bb7f339366946d2fa852bf53baf
SHA108cecfd92d28c63353858f5a0c63dfe2f2743487
SHA256b567ac4234ab95e7c99ab24fe751f45f26127ab37f0d9298d1dc38ef254b5ee4
SHA5128a271aa34c6ab570474b03bed76664667a3c2a69c12912a4b435f3044f7354b12ad3466bf9a5aeb154ec59ab7c19ecc69a6a3a2479e6e91e0b06aeaac55d55ba
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD594b3ef3bad5863cd235961e72097603d
SHA12f53b713d79361cb2f0c818ccdb622ffc8d9c864
SHA2562b28a9fd25c33dda9623a65259ecd2225774b407699cb98d89582d8996a8d9c4
SHA512794f4e321aa3f2e55aa4557a2622d4f66de6bf46575f6c048dc9bad07d375cc7eb23b03879738f3f59efc42136844d399c2e13bda17050959a982467bbe91c68
-
Filesize
1KB
MD5ba4845e91645cc054db33e42050f1698
SHA1182fa9bb79467a9c4564de0a08be46620a956ab1
SHA256c488dcde2267443e26773c86aa72284cf212079943c94f17c1f3a76ec57cbcfc
SHA51282eef37fb5178f0ca4204c8b9b2034530a55f880ec1c95d9a1668155527808a14f5de96460edaaaae4750ba37b7f8be40517844b7ca9b4a62c60b660c472ad9a
-
Filesize
5KB
MD56e26fca38b0bc3c5faa25dd2f03b9f15
SHA1e3ba9240425bc4a2edb4fd7626d7ae8f2cde0a1d
SHA256ace5937c665e516586d667cb1305725c3068d7e8978116a07c858d06b6e8453b
SHA512a995f8b191e1b4d1d40a5d0851451ff2697e3e773f65c01385b140e4dcf28d4329eeb0c0df002316a321e24224be7e2698d69a689cda9e2fb2d756af02bc642d
-
Filesize
7KB
MD5d23f192b122d06a0a8f7a768c553dfd0
SHA12753e02a2818f23c8777400dd6dec481d52801dd
SHA25604918b0e3331c6525e2756842f8116d62407fea9c515dec1e0e4b6da9a89d49c
SHA51287b301329d9bd3177d7826a310ce5aea593436dde92078791f0135a39fba76a279b906eaf9044727b41409785b6117e537709a6e1337b70686388192800d7d84
-
Filesize
11KB
MD5428d8b8cdafd6e36117995872130efa6
SHA1772aee0dd150fd9038b816613b2ae5e9b08e6f22
SHA25616d8a177d5d00dca40286e63ed0f536711cbc685a63998d85e7e590140e1cce6
SHA512578dbb9b854ec1086eb0e17c879d0c08718b68cb5c990a7789eb7da751ea9f63853d425e6ee76b43d89f63989961c2d9a7333231949721e2abcdfba4aaa9eb21