Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
2ae2632c67e6b95e412227a94e5a10e5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ae2632c67e6b95e412227a94e5a10e5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2ae2632c67e6b95e412227a94e5a10e5_JaffaCakes118.html
-
Size
72KB
-
MD5
2ae2632c67e6b95e412227a94e5a10e5
-
SHA1
f620300500424eb8d318655417cb6ee0ec2bb0fa
-
SHA256
2240fec0f3e44071f13d36834364d6720888ca8478af3e2d27efeac02e8ec6b9
-
SHA512
b23fb7fbe040661ccab5cbb682a845dc9f4e162a0e383d36bd6e8356fc50d7f32efa62a259f2c44c97dacf3cc492ce138b149bf0a8ed3286e2e4c637bee38714
-
SSDEEP
768:EUb63eSdBWNla6owrEQvQHXKTMM28MwttEkO74/xRAE7KkFZD7fq0:EUb6yBrJ43KTjPMUSkWaRj7KkFw0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4912 msedge.exe 4912 msedge.exe 4404 identity_helper.exe 4404 identity_helper.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 2100 4912 msedge.exe 83 PID 4912 wrote to memory of 2100 4912 msedge.exe 83 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 2964 4912 msedge.exe 84 PID 4912 wrote to memory of 4392 4912 msedge.exe 85 PID 4912 wrote to memory of 4392 4912 msedge.exe 85 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86 PID 4912 wrote to memory of 1972 4912 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ae2632c67e6b95e412227a94e5a10e5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8a7946f8,0x7ffd8a794708,0x7ffd8a7947182⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2404501646692772255,6874264562200659785,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD52b18f5e8198be713f86a7ff02c5313ab
SHA1bca957427ee5e9cff5dcc86cd703f8cc63c1b09e
SHA256bec19aae5cd1b3c593380557e6adcd3b9f9130791b8d43efb6626263e1828a62
SHA51204ebc03dd3bd1029fa3d52f7264794841c01e5f038166d525a2c6a059453e20ed0c035bb0c0245ffa43c787c9551b20cc140deed19c3bf4073d83f940d2aee4d
-
Filesize
1KB
MD5ca56753fa13f46f340c2d969fdca02ce
SHA1df3ccffcb9c436bb80ee500947a4d6e289b2c812
SHA2560425af567687d5ab0f5566f2a5e6c2977695b91b0697159f1927f2d62b9a48d6
SHA512a373588e2955ef88f790ebba1f135132cccb53f9110fd82183b538f02cd33f0af05d88d7603f7e318e31fcad395fb039d019659e89ada919d65cb631f5ded3d4
-
Filesize
5KB
MD5080cf1e3c632f5850f8b808ea408d089
SHA17e12244bce884f0c549ab0c0fa98c3a5bd5761e5
SHA256b1332fd31517e72808ce0bcc40209e25bf54ae4beb76e5b7e7e33fed8e2d383e
SHA512685746765e30a2a1dd34df120f68a7af6e18482b514ada6c303d9458cb5542d02f5c36aad55290879c4129b86962cc284817e96a0cb3be478d14583473014dc7
-
Filesize
6KB
MD5867fe37b9c286fc1317ccea1d1efdfd2
SHA18e2f1ed0e6507e4d3ab85dd9feb54a8d96510cca
SHA256d0b15011e4ce6ab00a47ee35194c06d65dcf47f4166fbe88c0ccb55f419a8e76
SHA512851fb35351aad107df0e8bb8dab002fe8cadc559b1b6979d0e657e1e11abe60712bd65cbb94cea44348ace4df277d4a527bf902a9931f9b519f86bd57ef3fb49
-
Filesize
6KB
MD55e5875c3e78d76a4a80344ce3ad7ad49
SHA186519e2160c8e16d00250c0172cd5f65d2007549
SHA2566a9c626301f54d494afdeb7aa1bf2562c8764c410bdf7ab248622cbb1db88928
SHA5126269254b69dbcb7a66623cc30e720882dd33eb95f9044bb5d75e03a66399a0d78ec3838343b088e4f788689757a86aedaa1959fd3ac18f543b134aecda50d0bd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a3ea83d66d254da1f8c007d8533eceeb
SHA192b49dd10d734300212dddd65a27f64e22628950
SHA256ecf32861c72883b6d98678e53c4edaa884c5289ab89942209d770159b15c4e60
SHA512eb723fdc7a33eda82cc405bbc314a16a491d3247ff9903a87b39d491912536a9b4f13e50364b092d575fc4e93d276e6b9f73589bef83d51b701a4fb512cee9e7