Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
143b76c40eedb80aacb8240e801f701f_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
143b76c40eedb80aacb8240e801f701f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
143b76c40eedb80aacb8240e801f701f_JaffaCakes118.html
-
Size
80KB
-
MD5
143b76c40eedb80aacb8240e801f701f
-
SHA1
343f3e7a24ffe758ff9c4bd9eb14d7257cc1874e
-
SHA256
c82b76e5a25912cdc25548eb342748ca08c31b3d5cbaaee4551372d9ae8b7961
-
SHA512
e569ce22b021b5c5a2bf10cc801e74ccbe5a4d3802ee01e9366cecb157529bad4844f4324868f7bcc359e6d4d6a9a155ee74be9169d97d83d4ccbb578c24318a
-
SSDEEP
1536:muxWllSWQIaAktlhUx1H2LzxDVpjmfHNRZN/Yke2seaWeWneyqePqF1Mgo5aYX0O:LWlAWTx1H2LzxDVpjmfHNRZN/yVAfaWl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 3572 msedge.exe 3572 msedge.exe 4436 identity_helper.exe 4436 identity_helper.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 1424 3572 msedge.exe 83 PID 3572 wrote to memory of 1424 3572 msedge.exe 83 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 1936 3572 msedge.exe 84 PID 3572 wrote to memory of 2020 3572 msedge.exe 85 PID 3572 wrote to memory of 2020 3572 msedge.exe 85 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86 PID 3572 wrote to memory of 4380 3572 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\143b76c40eedb80aacb8240e801f701f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff553446f8,0x7fff55344708,0x7fff553447182⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7866530191053454307,4438080400830133191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD53a8b68f78937b85a85f19cbede6cc6ad
SHA14fb1c5bb8bb07e964c4da89edc8a072aeb427d3d
SHA2563f057d175e90578fec93380f98ad6893b547d09fce12fac6908128cd4c385ae8
SHA5121b97fca449bf070b98720d371bac16eee96aaebce37db2843ffed11c44f9e0032e2872a8fd5ccf21ea667b43c219ef8883fe709f0e9dfd012dead1a1747f6bfc
-
Filesize
850B
MD567a95e645543e58f53ea31b47575cdf3
SHA1196121b4ddd889be27547d35928b7e434f11d857
SHA256720c81a59d5cac49b6e75f1a79812abcc2df95008e76badb6badda216e0fffd6
SHA5127b144c0962156dc7fd0623a8f2dff24f3fe6b9e7af2e485b316c6f09f81f5cdd05f442e6d9f8f54a55609b6eef588c0f65c0e67d1d84c9c72d6ce564ba816d50
-
Filesize
6KB
MD5e2fc0669163ac46d596fddda7dfe6bca
SHA191c57e8c1d5484ad26fb7a41a449a90bc46f0e26
SHA2562ef92997ae9a7085306375b625d2cf478238cb451579babbda7356c08ce22552
SHA5121a6f96046ccf9846a020952f64468c09700fcfae19ead2222bd5f4655b74fdb7d398612ed378beb86ac7c8ea718a51a62e36b3a902b58995d6b740baaee707d3
-
Filesize
6KB
MD565f47ea34dc9d4437e8bbf78a122a3c8
SHA1396db539f4ef8c9061ed3cee8f5a732e1bac5512
SHA256f94a07870bed083eca5ec9ed31cafe01302c73059ac1b34be117504e82e27b6c
SHA51236dc4b296a2f0737a7cc67e2300a8f56c540ff0176a5133de32b67d0bca122e4555c5523125494e7449cde251ca12a36947743dd0c37520849695f6feb7ab1fe
-
Filesize
6KB
MD57739d8ebc357a0c6ac7c057eff8548f1
SHA14be73b9618d55165f32bc4e6f0d71256d2996067
SHA2562228f9d93993eeb633a8140d5935d3dca7b571351aa49915265d0428a10cb9eb
SHA5120a90b672406cc3360eb6603ff8cc86e809692af1254d79112f8f9d16ae938e46a3cdfcc91b0d541ea06b3ba42ee3b6408a00e2c9925b0901deedb3f797624475
-
Filesize
540B
MD54ccb549882c7ef88903409a79c08e5d3
SHA1fda3197a138263765a76fa11bc350708f34956fb
SHA2565916aca2d777bacfc6c3eed8dffff36bb19081296d02faae647d1593af3f29b1
SHA512004a60bcb7e5e8c4fa66a06d067ee9a953b9a7d1f22333520c115c8606fdee2fba53ba43dcc3b3b177f9e36da803065a06b19ae3df41b0a6680a5c96e93882b2
-
Filesize
540B
MD569f69a590ab82a32031ef6a598dc6987
SHA1d079e74fb4c97a71fe57305535bf1604ce1639f5
SHA256b3a48d701f0221d972df38a8fe42feaaafed6d43f5f69cbef016792908d46fc8
SHA5127d90fa9254bee21c09a7834044924d48e1ac9aa6ed0fe55b7d85a96a36505b1cb8b2062e9e5dc3548759cc447884b12690c72dc9a25332c4db5a1494ec4a0fd0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5177f44cbf0f7ac6f1af60fb80876f059
SHA1675fed8da0367c29929fce02099fde1a64304311
SHA256a92b985b88071534dcca30970a762a8f78ef6be5d602ac75a85901ba42612a91
SHA512a5cacfae14d05159f6f5b2d95c4162b88456602d7938d4c1d0a1097708f3ad75807e3aaca8b71399c6cf036f3211e6bd03778b35a35e8da554c06c26fc5492ee