Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
12b0a77c4dbe96f22879543623fa0a0d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12b0a77c4dbe96f22879543623fa0a0d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
12b0a77c4dbe96f22879543623fa0a0d_JaffaCakes118.html
-
Size
47KB
-
MD5
12b0a77c4dbe96f22879543623fa0a0d
-
SHA1
74ac73bde65edfb1ce2792b7b80355d056ef2eca
-
SHA256
a6e2f7845e5580053bc235b6bdb2083e589ef9177d5287e06be1d0e7da270c75
-
SHA512
9d15ed49f2e77c6ca55173fa7f7da261d6afb8036ec5b495f4871edbfcc9f9d6759432497ca8261eb4a4d02f51b1422310dd597ee5a81033c59a006fb226891c
-
SSDEEP
768:B79w3xswKydVpurhugo3MXLEw63VgeACRm3Xy9qM6NtoVfhPO69Ck7S2S0kD:B7fwndqrktMp2O69Ck7OD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4680 msedge.exe 4680 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 4352 4680 msedge.exe 83 PID 4680 wrote to memory of 4352 4680 msedge.exe 83 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 988 4680 msedge.exe 84 PID 4680 wrote to memory of 4128 4680 msedge.exe 85 PID 4680 wrote to memory of 4128 4680 msedge.exe 85 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86 PID 4680 wrote to memory of 4412 4680 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\12b0a77c4dbe96f22879543623fa0a0d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdba2546f8,0x7ffdba254708,0x7ffdba2547182⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,15183932939298422466,13236006560142534658,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5d5a20e637474ef0d39ea0dee09057aa6
SHA1cd0706347c59cde5d53c5f529907804f2edca19f
SHA2561ca2c4083088da567e467704fd688a9ee09d11534725391819d439a06f299c24
SHA512f3faf3e2a9aa026a5bb8079f577f701d3d37bd8e240049da32a165707b3033e4f83631c8c39291cbe47027d72bc0bafdcafe859e90769d3c5c8a626e4b00c124
-
Filesize
926B
MD59d8d6ef38d177ba1cd617512b9c15012
SHA1b3357a3a25bf258ca3defe05bea9e0c698a6b862
SHA2565924ce2b1f3fdca681c4a6841d39cd97303901e737d6613c0029783d22e4bc8e
SHA5122db3365ac70b28976f5d358c67d81562231032a8c854251259ea21b1875d415c09f90f078f732710548254266a5bfbc49beaa1a65aac00079bca3769beb185b9
-
Filesize
6KB
MD585de37bf7ce873bece6fdc3dcb68e962
SHA1592e0604f1e1f10287805d26993404fc9b9e2007
SHA256a7efbcfafdca4d717b2a8efa89e752bebc163d2befe7de6ec504d84dcd6b2f48
SHA51240eed63062a766c758cc6ddd93cb8594d11717b5709ae2afaa15f07eead0b8b649c7a79e49f729d18c5813ed6cca3b4bdb93d35d521720d469f476eb3d8f82a0
-
Filesize
5KB
MD54ff9e1f74be52f855823fdbbbae72685
SHA1978bc1898ff30ba21b8147ebf0e069b718249222
SHA256c7130c3e6714083fbbf77af6bb2a311c72b3b296b6c656e2166259903891707e
SHA512914b8e4caa96e7167e553fdc42bc37e179d98935f0fd06722c1d6f4e0b96666ee05aa7a7393a16e673af0077024516dd30f051777d94c1bfd54a53ed9de9014d
-
Filesize
6KB
MD57635b6aaf05f996abbb4758f25f36dfe
SHA1eacb9d15d3d7c81cc58ea1c933e51494a6156a53
SHA256ec489758f34aa0533d799a6dfee19c8843e8e08645d565bcd5a875b7642dd63e
SHA512d1e0ba39e544f0ba1bbeee08ca1b804a55a487663d9e1c06a39eb7335ee1232ffa3095b46e85de3471dbdbccdfd635419bf7f17b6b81759acb4f7de3cc4fd813
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD502efabf65f93b7467c52453f713dbace
SHA13de1b6ec68b5fd8e3c641a722e58bb0cc6342e29
SHA25644371bc092353d1d1ec94488a5508f5502cbe2751c5a252ece8c1d780a38d729
SHA5125623c83dd2d822eaace75575a02f382afb3139951a2802b2293771d15bcbfe076ef5a5bc3bcad7b3cc1ed7382c7f49a4760f97dcfadfa60ccb71e71912fa509b