Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
1680616582c2e46f24c7edf5e97384db_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1680616582c2e46f24c7edf5e97384db_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1680616582c2e46f24c7edf5e97384db_JaffaCakes118.html
-
Size
92KB
-
MD5
1680616582c2e46f24c7edf5e97384db
-
SHA1
de71ac96a9a28150bb47d547fcef1bdc2c45d24e
-
SHA256
464f496c0d887bee7606062e2aea8c79bf9530a57d0c5729bd53118d5e3f515d
-
SHA512
e60ef7df9e45020a8a6eee58562fb5a88dbfc420602805968ab20b0b04d0b3c6a608117acb1adcb5767301ba57fbabe4cc1e79ff376df190831b1dce650abb7a
-
SSDEEP
768:STmWZs5DfzEBr3TH+YnoafplW2xm11Bs3URQbPDl:STmWqlfzEBr3TNoanW2xmVs3URel
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 828 msedge.exe 828 msedge.exe 5072 msedge.exe 5072 msedge.exe 3688 identity_helper.exe 3688 identity_helper.exe 5276 msedge.exe 5276 msedge.exe 5276 msedge.exe 5276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2692 5072 msedge.exe 83 PID 5072 wrote to memory of 2692 5072 msedge.exe 83 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 968 5072 msedge.exe 84 PID 5072 wrote to memory of 828 5072 msedge.exe 85 PID 5072 wrote to memory of 828 5072 msedge.exe 85 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86 PID 5072 wrote to memory of 4980 5072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1680616582c2e46f24c7edf5e97384db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc041c46f8,0x7ffc041c4708,0x7ffc041c47182⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,18205897501072506931,125641163026954928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b8d3afe200105a20a1e64823b08c1949
SHA180fb0e95843d846cce34995b628acac3c64367f9
SHA256b5df6dea5499e310d3726153c914755d80fd8bfbbf53eaedad6d9345cdc07762
SHA512b057a3eafb95d2cdcd53883854a136933f80fec6a4fa859ef1c1ce583f9ad0f83d425275f334d8d551c953d40d28039f1b83154d0e3a2e9235238bf94519d91e
-
Filesize
324B
MD5ff17505b02d988cd94ac6b26bf718018
SHA169f3ba890950867b858fb4c1bface08058ddc38d
SHA256d0718af13cae3e6a7b66a86da4da75938d0d6b84bf5f9039f812d588ab9a02d4
SHA512c6570711fc94751163c9a7b8f9932d51b7e472e86707ad8a651f76814408b01e00a0f4710d680f9b168c510bfb527dc3106a254e0747f3254afadbfc73737984
-
Filesize
5KB
MD5b9c500c5d610b522bf902663b28c22e6
SHA1f1c055c82f7c0fc38026259329b6d3a41fb67830
SHA2567243703f4be6a4d241ad283cfc97999afedee72b54f5719d007a4d01d2886dab
SHA5122b95465c65faf9175de71442515e98113d8c3f6ded6db645867676a818435e5e8e3f13f04746e83cb3cc9201af4058495c63384d9e4411f61e9ff274d5052dcc
-
Filesize
6KB
MD50511339480299639942e9f6c2b9e4736
SHA1c81ef43a5de8892605313cf40e615ad8d4fc3ba8
SHA256e05e985d5ad1546f253ff1df5eca5de9f1b2a4c2d0f8322d744c90d3088b6534
SHA512af4f4a1fb152d18c411eded6ac6b726af3de736e1c365181997603054dd24def530787896fee2a57e6367e3a0cbfbc60a75de5bab3f8fb1925047851f25fec24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d16bc38d2e5fc627865f3808950f3964
SHA1485cbac62682cfd96fae6ebb550e43e56eb5f8d9
SHA256f9c73411d27e51d3e0e6169b535f9c27e75d21155e29c5c121a21a0060a05398
SHA512867ddae409a312f256776cd590705cee5c627e0ad0e4aebb79d85f6deb7a1a13bba804637e3f2d17b7a76887281083128cc00ea47f8161437150eed8155f483b