Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
21a72ecde7e4ca469742650d445f50e8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
21a72ecde7e4ca469742650d445f50e8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21a72ecde7e4ca469742650d445f50e8_JaffaCakes118.html
-
Size
93KB
-
MD5
21a72ecde7e4ca469742650d445f50e8
-
SHA1
4d14ce5e99854bf2a8ec33538185b73f5cf97bd9
-
SHA256
18deaff28beb6115edef741095c344dcc9bd3cd5c4cc14c4f546cd458ef5f2c7
-
SHA512
533a4730cf6271b080a68c12f2abb016bbc241c39eb10b7b567bb71221784654778fecc748bd4f482681436fa0d9bcfb16e1d23820664e1f5b618e6afd553d74
-
SSDEEP
1536:zo1PXBub1z8nV5/AGRZlS2R56uuFSC/bDz1X1HUK/oU1pJ:zCPXBub1DGRXS2fc5Dz1XKKAU1pJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 888 msedge.exe 888 msedge.exe 2240 identity_helper.exe 2240 identity_helper.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 1296 888 msedge.exe 83 PID 888 wrote to memory of 1296 888 msedge.exe 83 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 3708 888 msedge.exe 84 PID 888 wrote to memory of 4080 888 msedge.exe 85 PID 888 wrote to memory of 4080 888 msedge.exe 85 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86 PID 888 wrote to memory of 3160 888 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\21a72ecde7e4ca469742650d445f50e8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeea9c46f8,0x7ffeea9c4708,0x7ffeea9c47182⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3352 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,18181420448258573325,14168327339845492267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a1ce569d3aa91e1811ca0da89028f9d3
SHA1fb19ebea2e265520693693b14ddf199fa9e8a212
SHA256b99d4c07169cd4c867746e9630fa0defe97b2b3496a4d8d8c8fd0a6f22caa5d8
SHA51221a394ed1dd5d9bdcea3f9e7b8fe03a146dfd38110b3613789b06810807947ec394b41fc2de81e647ecaa0858ccd65f35bef0aaf569c6f636708d3ea767467c6
-
Filesize
1KB
MD58893eb44b80238bb6e99631929e1ec83
SHA18fd0c5eb803d9c2691bb4bd0ad571fb27b167ad8
SHA2567cc8b0875be9c0a2f97e227833c1e9760b3b59aa5ab56677748fd5727f7ab6e8
SHA512c7acecd6fc1594c97e66b86a280cef3aab533999eb3a2b8d7d00ee33c8c8fc07a0ecd01d2cf7c23169299c2225bb75df348fcd36e84c32c1692a63b60cfb8313
-
Filesize
6KB
MD58a4454f90c0617c5fcf0b794c79ea85c
SHA1c22916ec04870a032dd0b9b6c8d0dc7f4161d7e1
SHA2569ad9309e9aa6a99b741d20401ed191851a8a0a2b50c7a7d3b42198f881314d0c
SHA512cfe20adf257acf5827565ef792fee28c84b420bba71a548a0cc317b9f13d18b1b3757cc386e125d63f22d6da77845c0adf128896a7b56096ef81eeef63ec3c56
-
Filesize
5KB
MD503945bd8dfc6a1953bae30174610de2e
SHA173433025d0cc22946fc3b1013031707889e0d054
SHA256f0284e15556023411457bc42473099770fd99e35b389d18f810a1504a568ee03
SHA5125c0762d74b7b52b78efd3a70a8293ba76c9df52388f38f093dd01bc5ef4b250a65953fb23ecfd48d050cd7dcefc4032ca9211441bbc90a8b48d35c7d9af81d09
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c0cd510dd9851e76e0923cd7fd997e0e
SHA18472536b81fa1c82a6bfdd2521bab52744a97398
SHA256527a5d8909d140b7e5d271138f0ee6f7bcf328f3f27a9c84626089f730ed24c2
SHA5122d998ed5ac5f6b90ea29db0d6116677e5ff0014a39563f6f02dba1370fd495aa7d91706e70c3bf05ec05edd0000b009daaf06c0501af214912d8ef32276cd757