Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
12d0026137ac204a76c9c4287edb5ad3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
12d0026137ac204a76c9c4287edb5ad3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
12d0026137ac204a76c9c4287edb5ad3_JaffaCakes118.html
-
Size
175KB
-
MD5
12d0026137ac204a76c9c4287edb5ad3
-
SHA1
ca3377495fc2ef197551ea6380450c0ac19ad480
-
SHA256
b1027887a3f24520f8ab53fa5685376cd32f35fc9a61bdcece568fca6588beae
-
SHA512
168b17d8647c24063f70ac27cac054c7bee49e07ceaa82f30d593076d053bd98fbe1e2b5f15df230848a75983f9fec5bd803c970bedd81b713419ae2edb716cf
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3wGNkFDYfBCJisC+aeTH+WK/Lf1/hmnVSV:SOoT3w/FaBCJigm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 2636 msedge.exe 2636 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 888 2636 msedge.exe 84 PID 2636 wrote to memory of 888 2636 msedge.exe 84 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 64 2636 msedge.exe 85 PID 2636 wrote to memory of 4904 2636 msedge.exe 86 PID 2636 wrote to memory of 4904 2636 msedge.exe 86 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87 PID 2636 wrote to memory of 2472 2636 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\12d0026137ac204a76c9c4287edb5ad3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca55546f8,0x7ffca5554708,0x7ffca55547182⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13202359833580583823,7606309817383448368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5aa908f7f782afb6c1ea50992ba37456d
SHA18fc9f859a475b2fc05c270db6ef5c27e20b6f15d
SHA2562a9c9e98292e7994fa42cd0abe93e4f6cbfe40b34a71b6a614cf0959e6a4c99b
SHA512a9f031e07afa054d1a90eac9a8bc61598e62daa3755bc3621e3d888f9e14891a9937feb3fcbca7ccefc2f1bb29282e7deb0ed3845e3466c5dc8a5d47803e096b
-
Filesize
2KB
MD55219455ec45adc54c6415d429d70bfa2
SHA1bb8513a9c7d982949d6af42ffe37fb73e1c5a084
SHA256d15b58e62233d14d64ce5d736a475a01644e7f81cbc150a9847d6e5b759ae109
SHA512c7554cba13729ac32a9a81077b850c9b9ec7ff71b0880091fac03a422a26bc85812b36b565a1556675ad3460f85b93ecbf596dcfdbabb022fede25f6304676b6
-
Filesize
5KB
MD5168c4555673a7d8182694dd66cdd70ef
SHA1b1273581f2c56c1adc8ba7bc4bb48891da8e6f88
SHA2564a2ee2f7a62184569693d45c2850ce06aa87fe00123a8e7ba9093062011dde60
SHA5128f175df189b323a267e9141c9517f2248268cbd462546e69d33162d999e6d28a651f761008aae8e0a82490e1d77daaf16091abfa92cbca2a35ea4282030cb51d
-
Filesize
7KB
MD5cc6d28c943ec008fd2746e8898c2e2a2
SHA15bc4fcaae15cce56fd908f63643ea46d9c6d1d88
SHA2560c8b244fe3a54b90ea7e453f60eb6d406c960a89a9f6423ad6ac91d2e20c6f14
SHA51279ac07fcc29247806b4d309c9f1643373ad33470d54ba272f12b08378a0c555746fecd7fff5ef749f08367596f51d90e9cec39b4dbad0df26361929f3aa7045b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5774de0d8fa753f9bfaf500eaf337e476
SHA1f620157e2c4ddade5cad0127f3d00c77b1535a91
SHA256f5440866160addacdfa1319228d946a981f00103c92bd5d71711de53c4d6b68d
SHA512910b82d4debe32a254595ff63a5cc9df8d691ea5f36b48aa0e8312c099ee6c240068d91bd9f978d205a6be146715e0bf8bca4ae231080da4acc9c1fada539c1f