Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
133d377c4b36bab415a67d953748a0f9_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
133d377c4b36bab415a67d953748a0f9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
133d377c4b36bab415a67d953748a0f9_JaffaCakes118.html
-
Size
28KB
-
MD5
133d377c4b36bab415a67d953748a0f9
-
SHA1
91a32620cbb43b9fb0c290793da0c2096191ba24
-
SHA256
aa8e76861df6932da857cad17d89ff4e32464355850903fb0f2e7c828a601505
-
SHA512
bcbc38c0482bfbeed908a78f0cf9002c876ec8283c80e63576e84695346851ea57eb4ae27431dba6d842e5876db2bec3bf97ed07ceab677ee852d3e7ea86cd09
-
SSDEEP
768:XYILQL2UCknclDw5vFHxVprnS1TX/1JPpt9zDR1/t4mz8X:1TUcUBjmz8X
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1776 4608 msedge.exe 84 PID 4608 wrote to memory of 1776 4608 msedge.exe 84 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 512 4608 msedge.exe 85 PID 4608 wrote to memory of 4524 4608 msedge.exe 86 PID 4608 wrote to memory of 4524 4608 msedge.exe 86 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87 PID 4608 wrote to memory of 4412 4608 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\133d377c4b36bab415a67d953748a0f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd29046f8,0x7fffd2904708,0x7fffd29047182⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17406788764668452577,18225582454679256307,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5554dbe6608dc3cac87eea2e0ba5574b0
SHA1ac767197e02bc519673b0191604619ae5c54d409
SHA256a12c1a0f6f1e2da83b5597e5806bfdea4db2f7d63be8185695250ad0691e1b52
SHA512de07f035237368a41f0be1f2d008ce2edb5933d56e7b6d4447466c1afbe41807be5fb656e48237b6d67b37e6573633cb1a788e96fbaccffe27491700e2ae3277
-
Filesize
495B
MD5dce2fb3a5dfaf8eb58afe3b67f787506
SHA1df060c5ab4ee5533cdb6db4745bd67eb9b16ff5a
SHA256073c033c2077fde5a5ebe6cbb1d53cf1bead70db5213fb5c23d42301b848ace1
SHA5121af1d9a83bf1ee0c59875450cf6a6549989167b73851456364283dc79f406aaa8f73fb376df8bcc8371e441f2089491526334ea68bbb33259653f4aded0f2a00
-
Filesize
6KB
MD5704209dd878a5b27a3deef318a6e86c9
SHA1c189d6f33046a2f5265c3db88f6015c8de576e5e
SHA256026009f2cca0ca2895d0d9363e7b36b929f756500bc7858bb9ef7cc4f1d55778
SHA512b22387b2e08b063958483b0256068920ac451d1fc2e530163ac3189ea04c93b5d3495e9a49c7f6cd1eb9a93505b74d98e05ed7ed657272f6682f2f36624ad85a
-
Filesize
5KB
MD5b176c794b960e0fd323d07669cf656e7
SHA1d43f47698b0a8de67359c2ecde6ef8f169d93616
SHA256d7001f23cb949c08996c8897e36470228c10f0cb605c1cc5a96d076e97644275
SHA5127309bfa2e459a2610e71e5d5cf5e096a79be7f5a521ab68031037996381779ce406873e6f707e0587a8e78c6a8b2373e26b018576d82280ae22b2e4e5bdcc02c
-
Filesize
6KB
MD50b7134ea5e4a1b519edc9e3f3702a35d
SHA13536a0f8404bf6b1ed80c64a58fab45319f6b23d
SHA256d04629ba32a2d15902228ded9e7ecc65cccd9c74222368d274a3ac3f32446ca2
SHA51291a8f5ef4637f473cbd116884fd1c6e4af3766313d67b74cbef1c3f31c61b1f63ada191950f3ac3a8270a437dfc5aaffecebca2edebec7cca8dbd43aacbbd78a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a80ea0c5211185f720bbb74e1ddac579
SHA1c0b13a3c486311974d41bd2126e7a77f26fdf27d
SHA2568daeb9a166adaa6367ccc562fedad9af0cde497c32b8954bb5d4fb963864e937
SHA5122d81b6bed46ff76302a59e0d08d52d646b99222d463337a0270cd55e51540e87acdc59b1d7ca78218fdde608045f0034eeeafdd1a0b8f92ac2614ea3098640be