Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
22f7fbbba1329411bfbbfeb8d9df5f77_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
22f7fbbba1329411bfbbfeb8d9df5f77_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22f7fbbba1329411bfbbfeb8d9df5f77_JaffaCakes118.html
-
Size
87KB
-
MD5
22f7fbbba1329411bfbbfeb8d9df5f77
-
SHA1
fdd5eda5875f5592b2f061e1935e48e9ad4d2760
-
SHA256
f10f00a0a78cbddd6cddabd0f3b35af3a626db7623e8afc0c0d49268d72b8b36
-
SHA512
365f6a6d1dd0d8f3f6d679ba44084f95835f8cb85eadcbe3c2b9b44fd911cf8f1928ec4a92130b60efd99d6673f4c84ff37871c73da71049445b7368ac268129
-
SSDEEP
1536:EHXHEHT17To0FSD+zWh4noKYF5YhpbuRc4qWuPr/1q8LUxBl5gFRArUe:EHXHqbSDo24oKSSSR7NuBLggFRArz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3028 msedge.exe 3028 msedge.exe 3420 identity_helper.exe 3420 identity_helper.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1480 3028 msedge.exe 86 PID 3028 wrote to memory of 1480 3028 msedge.exe 86 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 332 3028 msedge.exe 87 PID 3028 wrote to memory of 3300 3028 msedge.exe 88 PID 3028 wrote to memory of 3300 3028 msedge.exe 88 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89 PID 3028 wrote to memory of 1948 3028 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22f7fbbba1329411bfbbfeb8d9df5f77_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe315446f8,0x7ffe31544708,0x7ffe315447182⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5630955302178076647,4099040120065743553,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD558b948139e587bd5980d11bf4ac2d812
SHA1b5a79ad778492224bbcdf746e55069bb145015b8
SHA2568481e8ad53f03e1ce4e495f43a9d447a212ae221c2a282d5486d9fe5b74ee1d4
SHA512e5828c9889b88387b471dc10ef5fd251df40766071b805c4cc825d0b6f63b333f6869dace9d87299f982ed665ef7774a15ac985c8d5293d2562c84c1851d7acc
-
Filesize
1KB
MD51fb66e5fc33bb0f192f0dbf7341cde51
SHA1322dac7a399f25485071a9bcb4c25fb2235f4365
SHA256f9bef0a90e17acce22a2dfd9b0760b61a94fb74900841e56c6075594aacea997
SHA512463df3e855b918437c9ff89b0954b221db6e2e0d88dfd73bd3aa8d7ad920fc0ebf85970c977f4de4285cfac289fc657659cf300273eefbf0e2a02dd7fe512a27
-
Filesize
2KB
MD5288a331c82dafe794a2f78ed5fa7b5cf
SHA17aeda866d993d2eef13a44d053d710033815dea0
SHA2569e9dd0da34932235dfafd749434fdfbadd4e33a977f7de7ac1ac8b94ef3a78e5
SHA5124454e24dd71da8f798174b14cbb4b8b2c12ce428dd18966ee252395b8d1cf28f91f841f911772eedf49aa79213497ff3f87d8bb3438f335a9f235099b340b92a
-
Filesize
5KB
MD5a409c74f4ec7f82d410b471d555635b7
SHA1dfde100439ce56cf3108b92785124327729eb482
SHA2562f1187f4a8d8b651d09d226bd86b55574161fbc2391cb1e8f2152910acf73b77
SHA512eedfb7e3cd6a3218e92a023e631fed175dab3fc82ccaf980ca965df15ef0ae3479813fe35f216ce44b1e5fcd90aa0d96a5de4a80a6223577d3eb6eee05d93260
-
Filesize
6KB
MD56e2eaecb2f153ccd3cc37339e4e0e2bd
SHA171627a1ce4d2d44c2cfe823f3e758d31a499c6b1
SHA2566ac1a29c5645511abf14969dde00bb2238cf8b5ff56cb5dd29283e7f42dd783f
SHA512aa73b40bcf9fdba55ee492d0c43c121131eafc1b91a0893759b29e1edf67a72c35f98bf8fa29a322ffb7a574d06ed1aa99c86c75a877c02d844177d1ab91f14e
-
Filesize
6KB
MD57d1a41e83b2c45eeef18f006acf55f5f
SHA134b3427fbed683edb5d971e95375f50dc2a9b6eb
SHA256e4f7b9edbad8dccda42e1eed356e1804bf25460564ce6233fc7b5ed1f8716c18
SHA512654fc0829c57e26366588183f24f497ee7c2babb251953677fdbffcc861ab6a703da5472161e76cefecc20a0f8462badf39b08feca0c9950024f71f47f41b6ab
-
Filesize
6KB
MD51e0cbf2a4eef457794ff6718edbf3326
SHA1f9719db04e7ea3bedfa6829cbf32b7bcb790481f
SHA256262b4a7fd4a32786545c83076c57c5999aa1401febb4e643eeab2acd92027c3a
SHA51291810688246b4dbcb1225617f7c353b6106be7d27af83ff3d73809af602ca598727622cab7f41b5dabf9c35c5209df9034e8b88b9316546b5174b3baf762f383
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55afe80fd653c2fa28580a3c2c4e1e82d
SHA12a7bd3adde6e90575438c92e36032bfdda18b760
SHA256a3d52c1ef56b15f558737a29253f6d60e1e5e50b7bbe70f331f4f690858523f7
SHA5124fecf0e4c2f3163f5f64293b95c6ede3b64f06fe7ade41b4868bafa753e31f472f7e7aaa529f7c39802c8d817a68cd2da2e59e44bcd5873e1960a9aa4b4f0e41