Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
2a1667efb0bf112070cbdd922e66a412_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a1667efb0bf112070cbdd922e66a412_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2a1667efb0bf112070cbdd922e66a412_JaffaCakes118.html
-
Size
56KB
-
MD5
2a1667efb0bf112070cbdd922e66a412
-
SHA1
713be6858e738805865270989328c04c43b5e959
-
SHA256
aa9e1b8a25ba3eb59bf26b17a25e0f3fe88f694474950b23cf3139915881ca1b
-
SHA512
2946e42e57227226043631768b9bf19817c106c03aa310977e90568d5a32d3154b29810c7bfdfee2b4f8e2abf4a8461fb4eff50f4efe8064cb17e8006358cf69
-
SSDEEP
1536:wmDiHv7oa1HEwaQdT9eDFwYeA6eWJp7KAoeAQQJBB5zw4XhWRe:9DiHTTlEwaQdT9eDFwYeA6eWJp7KAoeK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 4312 msedge.exe 4312 msedge.exe 4752 identity_helper.exe 4752 identity_helper.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4312 wrote to memory of 1008 4312 msedge.exe 82 PID 4312 wrote to memory of 1008 4312 msedge.exe 82 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 2464 4312 msedge.exe 83 PID 4312 wrote to memory of 3416 4312 msedge.exe 84 PID 4312 wrote to memory of 3416 4312 msedge.exe 84 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85 PID 4312 wrote to memory of 2368 4312 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a1667efb0bf112070cbdd922e66a412_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab30c46f8,0x7ffab30c4708,0x7ffab30c47182⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11190028143315434358,14695137055221933769,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d6ef847aff5eae874373a89b7e299e87
SHA18c37bac5bf7b25988a813dc01958dc76148b0f77
SHA2567e32e0001f96a884d40adef64a6b1db5af3ec14b758d8dce9a65806810127252
SHA5128f21a060736967b48b5b000c67ceecb4388dc00d459797e8f7b92403162c42cf6879b3ff91192342148ae27afbe6feda7fef4a4d2a508775769300aa13e42849
-
Filesize
1KB
MD53e7a9a51572410fbb752d9d1ea7cddbc
SHA14bace33b9d0ec7678f8b4b7e7f1b973e0bbdb659
SHA25611aa906a5326f438a236f4a163f1c116d2d181ec8600c39e759b5eaa855393bf
SHA512f42c3a729a24b04fc10767ab0f5907dadc5c9b7b0e7d29082bc0840632a2f676877c5abfe8649f7777d357c6d5d6c9d84ee7414964cbc7ab150a30f9e34fe23e
-
Filesize
5KB
MD566d7808fd7207f4f9d136713bbb3861c
SHA1a7a59f5a81fc2401a1269a26eda4160f8539de67
SHA256688c71893ed6ee330a859bc23483a20edd7855a3a8e170c36cc9e2778c50dafd
SHA5121e109888ccd334d4f9db6d4df51ceae839ef6cc705e0661722559fb20d86e7b9252074b6a83cf96106eaf54a7b3cef1617470a664f4a77904abfefebfb55e22d
-
Filesize
6KB
MD52add67388aa597afb6dfd144ffbef894
SHA1215dc730ca2d15881577122deb50d1393d128da6
SHA2568e6b743366381d48e589e989ce312e942fc812420daf1a70845057d6c65db43d
SHA512efe7d624817aeac91b7afde47450e3ce14c35f8ef2d522d8c65ec490f9e3bd4c737e223625795b9501a7cd99fb52debefddd1510c8d579c0b04f42ff5c82022b
-
Filesize
6KB
MD5078c0eab33f76d5f8a219c1af18ec09e
SHA10e639e23be8a1371cc49936c90bfb8ef8becc704
SHA256d1061b5e646e26427589ffc0f1ef86ac6b6d6a19232b268f875733e767782467
SHA512c6c6e7674e333a2093448656053579ebfb8fc2a44e99c539bde9979afb84c67633311406c4238e8d0928c3586225e1d48f55febd977b6981d9b8a3b9aaba5cd2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55805628e26d9601f4e97dbc7f28e27b0
SHA119fa61dc276e3312e72904d79e9c5fc5d01d8776
SHA256636dc2d62df019a5a23ac1e691ec4346040a4470543943e24f7258a1e5967cc7
SHA51247c0854103b25966a5fe230ae720d8c7972c09fe9e01d9adf519a34d03d7e56ee66ad318d70fb19eeda609601a0e3f6fbad64ce357c6a85ab9db0bddb10d02a3