Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
152d5097b39725d00b86c95caec2bcf4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
152d5097b39725d00b86c95caec2bcf4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
152d5097b39725d00b86c95caec2bcf4_JaffaCakes118.html
-
Size
175KB
-
MD5
152d5097b39725d00b86c95caec2bcf4
-
SHA1
fa338fdfbe001c8be4a901450c376c36c09ed1ee
-
SHA256
3ed2fe9038014c64e7cf5e59e183aad25ae2b9d03d9d02e1be7616dc69ea7760
-
SHA512
852617d4c232f927a88c6d3129fcb3a9161c5fe1799601eb2409a5e152b34639dd573d1c25cdae9ffc24aeee3f8d81653da6fc291c6c2c229df839ad67ff9bca
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3dGNkFHYfBCJiss+aeTH+WK/Lf1/hmnVSV:SOoT3d/FWBCJiCm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 852 msedge.exe 852 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 852 wrote to memory of 2936 852 msedge.exe 83 PID 852 wrote to memory of 2936 852 msedge.exe 83 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 4088 852 msedge.exe 84 PID 852 wrote to memory of 3348 852 msedge.exe 85 PID 852 wrote to memory of 3348 852 msedge.exe 85 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86 PID 852 wrote to memory of 2976 852 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\152d5097b39725d00b86c95caec2bcf4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed93d46f8,0x7ffed93d4708,0x7ffed93d47182⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12717652911377017417,6269746711565161569,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD525b5d24b7400769555b205af9dbc419b
SHA1887301123ca3132bcef9648f9ed7ffd39f78c605
SHA256376637cb5d29df48f04c0745f461e5c560129a3cb0041a6a90d842142fb06c37
SHA512a2ef5e4af1d4bd41566ac438fe7bed067351d72ac458eca5a7bd26d44b29e1b992d67a5932fb7a133dd31cfec549b0d69680b0f6a7ea4873d4c02cc8f0d6458f
-
Filesize
2KB
MD598d5aa1d0911bc1e7188cae7b1389695
SHA18a427ae4e5104cfe90022b897914fe64510c5189
SHA25613971623601b76354bebfd9b2df2de448b566ed712bac8fb407e6a1673ddd2b7
SHA51276b557a17a2d58c1a95b0ad84452724a9588346ea9a79822b7d6707162e5647141af2b1c27426f3573b4bcecf129783adc2b72f11e689d6d702b3bca6897b1bd
-
Filesize
2KB
MD5223561b214c387f32220a86375b3fe39
SHA1306d1453d0e8a8e432d7778bb3532f0d82ee8ddb
SHA256957d843a749d793d219515652f7444d52faf4eb56280d21811a8d88063917525
SHA512d30374c7d3ef98e742965fa1c7ed7ed98ea8a0f39df88a93d24077d4ff16a684b3a7a0678e9ecbbc2a07ec0286f5f6f10e8cf19aa9a0049913126e91930376bb
-
Filesize
7KB
MD53f93c43bfe27cd6d5a89db9e496589df
SHA14215a1a2b71c273bcc1266117e2d918dc8d99c0c
SHA25660b1ed1880f2276ca72ec044b6741d6e6acf667dbf05901babf029a9e657de04
SHA51213b5d07a6daa3a06b56c1307da16c7bd7aea5b0edd8d0a83bd7e285d37f6d38344d56589809177e58c8d59b50bf1c75c556507e9948583c763d02cc1b4f829a7
-
Filesize
5KB
MD5acbb5ebb09fc150dd2b6b9a2fadf6733
SHA1040e549c76ca535274116f01c9654c46a2336143
SHA256b10b8dd7ac80175e0a770f55845b5d7bfa6db986cd7c5ba6f897d04b351c3433
SHA5128dd445f2101ef6b7708b154e31598f30bcf044084ddbb0919f2f7228f2aca92fea4b02909074fb8de412ced2ca0fce73057be0e55961b5293a6bb92aa72f5db2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5349af73592ec1f289155534f3e53b5be
SHA19717e0b3ff7757624c1bb9a1cf2d044a3c95379b
SHA256ed4c3e319837fc59e01d1072699f67a443af46526210226b5d09b3b5baf2bdc5
SHA51209f96a5530f746d8e3327110e713ebe4df71aefd985e754b1913006daf6fc78f6c8c28725666af5d7c67976388038a3fd95f99a65da1d7750ffb556ac9bb4cff