Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
28bd0184f24ce12cc1e68c7f904a9d9c_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28bd0184f24ce12cc1e68c7f904a9d9c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28bd0184f24ce12cc1e68c7f904a9d9c_JaffaCakes118.html
-
Size
70KB
-
MD5
28bd0184f24ce12cc1e68c7f904a9d9c
-
SHA1
a0aa0ad246a29a1de328e54eb2611e1278b1eea4
-
SHA256
85c12891fe31b0ff244be0be768a0be2b1cc07fc2aaf0e1a506456cefb4b7cfb
-
SHA512
28844f0632e970082d323d0b77f9e5303c50010937e57069441be21fa4cc274642d50db15c5bb357c5173e0bb6dd6f1a18cc676ef32c7ab2b99a63cf2d090c86
-
SSDEEP
1536:TGowWGWH2enw7l9hv4JQVLFo5444I5rPVV9G/BZm9JdhdhBLNGUUqZmB:TtGW9w76PVV9Gwr9YUUmmB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 932 msedge.exe 932 msedge.exe 2136 msedge.exe 2136 msedge.exe 1048 identity_helper.exe 1048 identity_helper.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4164 2136 msedge.exe 78 PID 2136 wrote to memory of 4164 2136 msedge.exe 78 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 4356 2136 msedge.exe 79 PID 2136 wrote to memory of 932 2136 msedge.exe 80 PID 2136 wrote to memory of 932 2136 msedge.exe 80 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81 PID 2136 wrote to memory of 4592 2136 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28bd0184f24ce12cc1e68c7f904a9d9c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa632546f8,0x7ffa63254708,0x7ffa632547182⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,1709078185913961151,4002549666593903922,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d944b943087b1bf6c13fe5c907eacb4a
SHA13ea6134ee41d5ec59903c10235b9fe1ec5a006dc
SHA256c2eae74055e4694f958256b277e28e66af7d8242df2a01ee734616ee92e925fb
SHA512eab6bf04a38b4d5bf48541b0c68d9fa01812d0734d825203ab296c14147ccfbf915955ea7526b217a497113b3409b05a6339cec7ec2f248ec9dad7becee09883
-
Filesize
695B
MD5f538e68e96f9b3c91d13f111e1a810c0
SHA11acd9e72c5ce3c70424bc87381bbe1ed0f2ce5a5
SHA2563d5089722fce2faff8313fa329e321dd5d30d546dd2eb30a713d61899d24aa79
SHA51246e448e234df2664e6d5f66011a6ca6b8f7d1ce1f0d1fd8419864be7c1697bc1164fbb505cd7d9d2bb8492af0f4d202d4df3105998d930799c943f6a2fc60172
-
Filesize
6KB
MD5a84cb1c3abc5494289783ddb82d315c6
SHA1b198c4aaeb6f42b3c760901022fda0e0714a5e62
SHA256c8f05c38775cb725a0b2b76305101860c902857b56fbf47b0d323f90029539b2
SHA512f53ffd014164bd2d7fa672a4c32817d2750b5bbc9bf46b4912110c45e6a09311a54058cb7412267be3451d86930c03d709f44df4dd83c60e57279fdfb4df6fad
-
Filesize
6KB
MD507aac24556cf01a44f4e6cb5bac6ca47
SHA16eac73c23ba453d949a2174606bbf9192c10ce6d
SHA256f3856da5d53a51ed903fb06add0496577ec6829905039363389eabded0fab405
SHA512f2612f2e3a2b51de796c3f385660a3148b239fa5a3881705736d9bfb74185c823e9c32d35bd6bc09dda3fd817a0896914a5c0632b8aa8c42ec47b8f2cb7a00b2
-
Filesize
6KB
MD50fd015ddbb0ebaaacc18f2bab98a4a2b
SHA1ea311ff8fd8af189b4bde599f365a463cbec10ac
SHA2564780a8bbfcf3082c0c10711914385edaebc454f8a0696926c44ff1befaf35841
SHA512d38d76e92aa39d76e070f18e474140e7d4a689387bb213c88c751f8206c9729d43b47c7442b71a791ba06400c8b1b38b7261dffb619ea961347b37504facc169
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d19a3ee06d0ce03da04cea745c49920a
SHA1761c81db1f166d9a98f3b50367843f1411026bb5
SHA256d04e076e12c3ab9a39d6c8fa84acc9a4b47ba50778a6acbf3ea3aaf1eccb2b66
SHA512d9765b9bd1acf733b39981251fcace5822a231c754f1ed5aeea904248ffff63bde13dbef06ae23faa5d181da4140426b383a6dce84905717751be24e2bc56fcc