Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
293c4c3f6842956d4d033c8c78f7779a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
293c4c3f6842956d4d033c8c78f7779a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
293c4c3f6842956d4d033c8c78f7779a_JaffaCakes118.html
-
Size
49KB
-
MD5
293c4c3f6842956d4d033c8c78f7779a
-
SHA1
d2e14cf7bb38347911e4b6ecdd3c018b385acd17
-
SHA256
508bbd85f5b2742212f14f867d02b76ad875f566768ab1d462125e789234c4c6
-
SHA512
6a56f1e129ec28a71642e58093c4c921ed59bdfb2a33db8625d0f61feb0f65d1d4342b71dfa1c4fd7c9792a8d9ae1019fd2567a144828fa31ae2304deecc3588
-
SSDEEP
768:8ayHHvPWloQRtuAuh1hbN33FEW2OiCooPZJD2BEkZ:83HH2l1RtVu55PZiClD2Bz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 3508 msedge.exe 3508 msedge.exe 1532 identity_helper.exe 1532 identity_helper.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3896 3508 msedge.exe 81 PID 3508 wrote to memory of 3896 3508 msedge.exe 81 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 5096 3508 msedge.exe 83 PID 3508 wrote to memory of 4640 3508 msedge.exe 84 PID 3508 wrote to memory of 4640 3508 msedge.exe 84 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85 PID 3508 wrote to memory of 1836 3508 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\293c4c3f6842956d4d033c8c78f7779a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc274646f8,0x7ffc27464708,0x7ffc274647182⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2968 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,6250997362100796902,2809179191116130005,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59fa0ae99635b0e19e5f2d792227d830c
SHA15a23ac10e3612962585e2cc7d7b31324091f2d69
SHA256f18523212a6f39a8bbd0d8216081b8355b08e0561268d1b77a942c603926b9a5
SHA5125fa0c2c2c78ddf3335537f1bd84e1aac731d7a3e79a2311fb120d13f3090ae9d34cd169d592c04ad9d8608b20cd0f6105523c3a0a3f278bcc77a50a878687f93
-
Filesize
1KB
MD5dcc8e7e9d1d3ebb487c3d951324a2a9b
SHA19e16820d38f55c117eb90e5b6d322e3ce7e84453
SHA2566d21413d6d70b7f28cf79f4d51185b04fee1579c8bbdbe1332b5c01f5dbf333b
SHA512b1f7d5156b812a336f7751231b59b4726a176189ce9b04ab70a245fdc4ad2556d4201e1576e23d76945a352146b26f0134d86c96530558cd82cf1ddc29275b75
-
Filesize
7KB
MD546bb2d4bce35fd1fff152e57d1b947ad
SHA12bcc1d49b8233a43d71078f735fe851186866db0
SHA2562a104bd5120e83376e13bf9d043c2f1dfe3c8f02d00662cde7a111102b14d2a8
SHA512931ed257e68333bee30fbc7792480081c0e25c8264efd50391c57064ff4f6f3370d8cf726969a163d47386c96ebdcc3849ebe21a8b6767441db47945c4dd72fb
-
Filesize
6KB
MD5cb36f1323abb621686c97f9fae17eb54
SHA107b754b0abc2682ea02492dcf694f0a80ad03aad
SHA256ef1ed3b0df308eab39ef5e4775216c8fb088e2a35c798715e220753ed8082e7b
SHA512babf5c6b655ac626a0bb857e25ed202198434bf813f7d02fbfcefb4edd04c53e5c039bbf4cb8f0061ad398b302cb0aa0d1ceba3ae0ffa1692931f33583f2a7db
-
Filesize
7KB
MD5144061fa053bb4cb8b2cc22410188376
SHA1abbcccb1edbe7dbf9cfb6c2e77398e8843c00e1a
SHA256a53a6f81de408ebb1386e2accdf82670bfcf05780b94823e234023ecad50c0cf
SHA5122ef47dcbe7f076c7e8f526958cfcd9d082702785ad6578016b5e9e42802ebe8d6ce665984aebf565ac5d94ff87324430d2eb0294159e197c21901990bf2d1c0c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e65542c42f514976e724a21adc9e19ef
SHA1ee7749ef5145941d3871be92edd36c0f718c9eb1
SHA256c22df3dfdc1e8415299542055699e9d6cd6285b5ff76373954b32e7c290844ed
SHA512aa9f07a824839db14e026b973e637c6f6177df4f3fec9a86fb523cc9a485852195ab7208f1a07ddf0b91c45ec2905aa27efce48d4d42b8cb9a03335b128fd5db