Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
2703061834dd6bc7ceb40e172e476294_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2703061834dd6bc7ceb40e172e476294_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2703061834dd6bc7ceb40e172e476294_JaffaCakes118.html
-
Size
28KB
-
MD5
2703061834dd6bc7ceb40e172e476294
-
SHA1
bfbfb019e143aeb58ba48f4b9cbd7d7b3e013981
-
SHA256
1f274cc8f002f24b704e9afbedc08ccc8b61ffb78b27b78f7c9318db1d95c696
-
SHA512
a73c36050e1f503706f33fb224f05ec08ad0877a35fce30eee13ea23bbd1874a9bb189f9b0b772bea6158270b43945de878c2ac208506dcdd03c06aa455fc088
-
SSDEEP
768:/E45NhKN1llGhyFn2q2zHhPGUhz/5UNYZsPxp:/E45NhKN1llGWn2qIGUj6YZsP3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1448 msedge.exe 1448 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 4904 1448 msedge.exe 79 PID 1448 wrote to memory of 4904 1448 msedge.exe 79 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 2752 1448 msedge.exe 81 PID 1448 wrote to memory of 1232 1448 msedge.exe 82 PID 1448 wrote to memory of 1232 1448 msedge.exe 82 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83 PID 1448 wrote to memory of 4916 1448 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2703061834dd6bc7ceb40e172e476294_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ace946f8,0x7ff8ace94708,0x7ff8ace947182⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4960644601978570096,18429166770994488223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5fb68d43056895f9aa18feb9c0a875dd1
SHA14baa2b8979f3fc967764ec6c9582663102a932d5
SHA25692e77482e58e22e572a86debe37f56ddcb998ac837c35c97030dba670a442cbd
SHA51286b277ffffb544851b26e1e5cd065ae2365e4941b7e8e2f9563c38efdc7b1585e0f1e4ffaf3566197a793150dd861cb1af97cee264e54ee30d45b08fd49e4d7a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5cf8a283731467f6990afc91ff11ce92b
SHA1df8fa6d0ff129664fc5f707cd03b04ab0acbd620
SHA256a5a1b44f4773fe3d696abb8f76fd1641df3150603fa7edb99fb0cb2326c98e77
SHA512e77e77d10fe7e35192f3e1691cb9b4528964210a7348fbf24090bbb0ccec511e11975c4e93c410020b8fd8eb9a93c55d77014da889e7fc479355471bdff10955
-
Filesize
1KB
MD5adc15351ca0863c97a215ac58c222baa
SHA1b7d5cbc95a5ff636a57ed88d7888ebf2b4f624b2
SHA2561f221a533c7ea6bcaf0fbb173878d907a76e06f5deb96fe7014dc0978517e595
SHA51232e10aae456f45ca6aef5323140dd99d24b7ed82a210da3b681f3ea0a7ec23826d7c16d354e690ba79f7d6f85036f9bdfcf31a8603a04ddbfce6fff8845ac9aa
-
Filesize
7KB
MD5450bd6053d7d08dca1225777e5223984
SHA1766b8627ca176322597d4735de7e94b4a9f54da5
SHA25688adb00182ef65b8475de16f0209b0b6ebc23d64a645b85860de237c179caa35
SHA5125d2a45798e7181f5f8c22f3c2bc720a990d7c90a10ec041eac40646c58dd91aa2ed676c467e38a0aa10917349ca0079e35d3d5a5d144f1315e108aa6470e5adb
-
Filesize
6KB
MD5122e5c036c2c4e470d692af7b1d2a558
SHA1d18eedcc83b1e82703c6ba26e52fa37c9042c179
SHA2560db25e1e38a2f2e52ea9a7625ef715f13d5a6cdf51b572df5909725a2735c475
SHA5120649d99a44fdebffd54f1b038f34ae9aec6bebeb24acc88ae0e941ef9b704f6d6682b250ab9c4fdd3983cc55096a72159192c0d1d336bd8c0065b1e524cd12c4
-
Filesize
7KB
MD5f0a9342a8e7f7c3660ec65ae449bc698
SHA14aeb1829669ae7cc36f37c59faf10b7849ae20d3
SHA256b0aeab1a089bd04d8419ea23d1a5cbd778fbd481340dcf19c4cb74d86ea1dbda
SHA512ecba9cf22b8486f4fe59390148daed2a4adf9ff167cdf50fec96c4a2df17da458e964938780d7590be7d7d7e20a53821fbb28dc6e5f219c7e1bc4141a05f5051
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD556ade15bbfc62736fdddd537b03de40f
SHA1e6ab802b489807ff6d094c7b7285387778f364ae
SHA25609ee48256f568489c6964760898cc11d63546dc16860e7578d5a2b74377c1ec1
SHA512bf3551f4cd3060b5766d2f2dab7dc71280a0dec067f9811de4fd660bb0f380ccc8d20f89dc51100e8db881c2fb94df843b9a0d4d989a17730f0adc1d57ee7da3