Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
1fd072d7977869dc62aeb92f3c4300b6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1fd072d7977869dc62aeb92f3c4300b6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1fd072d7977869dc62aeb92f3c4300b6_JaffaCakes118.html
-
Size
56KB
-
MD5
1fd072d7977869dc62aeb92f3c4300b6
-
SHA1
accf2df31b36d1e46ed55f07eaa20946e3a82ece
-
SHA256
a15a3a25d0a19c828955b251b84b5121a5b16e50e203f5e931b07ae66e1fc80a
-
SHA512
660c1541853e94161eb1aa5412b51e7100d453ace67086584e4b81bd187d7e9819fbbee46f2a82234403f4f5a2afde203a6cab4eacf9bb8bfbd54b599f9a6ca3
-
SSDEEP
768:v2RT0EipBVoya/ns+hZ99SiwV97dbLNOJ/WBc+YKZ/d2rJ5uQ2S9sT:yTupBVDa/HZ99SiwV9RLptmt5Y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 2340 msedge.exe 2340 msedge.exe 3176 identity_helper.exe 3176 identity_helper.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3312 2340 msedge.exe 84 PID 2340 wrote to memory of 3312 2340 msedge.exe 84 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 3208 2340 msedge.exe 85 PID 2340 wrote to memory of 1140 2340 msedge.exe 86 PID 2340 wrote to memory of 1140 2340 msedge.exe 86 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87 PID 2340 wrote to memory of 1280 2340 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1fd072d7977869dc62aeb92f3c4300b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a5b546f8,0x7ff8a5b54708,0x7ff8a5b547182⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13442806352566851313,12608990651269725961,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5bef7dd2bcbc6eb7fa620216fd7279076
SHA1a29033b3b06ad96809d2757e3d04bc122b66e191
SHA25658744f366a06cd9e0614fc1d24255b7ae22f56c49ac7408414f01bb5d11be1dc
SHA5129667d6160b01257e1fed78cf3ce15f4c58b24afc5803d3a63d1b7169d2cfc7a3562f176cf5400c60dd3cbbc61c6e4a76af58915a1e2157928429d4859d37b5fc
-
Filesize
1KB
MD5072bb196e69b6fb4afbb38838d6c44be
SHA18c6968611ff8350fac666b570c118ebde0094f66
SHA25623df803892f3bd494479c7cd3af85f7a65d7464384967957413df8fa6dfb58aa
SHA512f4b6dbadf7c986d8b27396b8ce9c5c5adb1419cba9b1ffaab8feeca1c5079cefc571c9797f241ed84aa5c39812fd46d560ef5d5c753429537c089f40ac7fedcb
-
Filesize
1KB
MD593dc1c6afe51716c233324f26cd85208
SHA1b6d1e51b8543cbbb145e0509eb79747a36302435
SHA256884b1d75a34108ab0d3375a5d81058fffe3ace1b9b53df543ff96f4410599e43
SHA512d7eb617b28bb1dfb177ad253fae97b1ea93b11f48677c6ccf789013ebb733f90870d295a0a6fd7117aa540c9c51d6f30617ff1e237a1b18e87016d811cdc2e47
-
Filesize
6KB
MD5cf47325e6132c0456c542d24267293cd
SHA19c9b3204c9e042c99f6f1c267a43c0ae6260f50e
SHA2569ee2c6a16520ce2906b30e80896a1691342835a7bf6304aaa2c4c1de6eae0f1a
SHA51293bb831ff4e28e3bb34ee97e6e00a0120cbf5a9895a63c45de2e3608a588d1461956564e9495cb6352b41d21763b201c22561e206e1ed2a0d93e7f194ecfac49
-
Filesize
5KB
MD5fa8a95141417431aba225a9c0e829570
SHA1f3ef4a011743d142f0c7932c7e469c87a3faa411
SHA256757aca050d7766aa18a87170fd11568aa7623f3a6176debc4e2309792b3e46b1
SHA51277166ef467251af3a4d0eaf2e4c7c9de482e07ceefb962ef7c3f2642844cea93a14eb51bca6c77a8e8f41084f1120a1ecb3db92c7b1af9cb32cbfe8deaf7656f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eae0636b4ce57ad9e463790f357dcff2
SHA1802c3d81bd2714634adefb30296c3f30e7f8c5e0
SHA2561967bbbbb29ef3053a1b6ae0aa1aecb2553a7afbb33e92204498a1dbcfff3a64
SHA51222fc6bb0dacf80fcb040b143ba2796518ea52b401645a5814b306d76a06946d27f9d4d9c434e03601e4aa6decfb81702fa53b32fcd7ab7cfea3b9223b277bb63