Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
301175a287d4de0ad492a2b055edd476_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
301175a287d4de0ad492a2b055edd476_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
301175a287d4de0ad492a2b055edd476_JaffaCakes118.html
-
Size
404KB
-
MD5
301175a287d4de0ad492a2b055edd476
-
SHA1
87bcd65a9d7b133b1607740d8ec9376b925c2ac3
-
SHA256
a92e3fc21e1e1441746f117342cdf0b69460fe3541c6067e7963ca5d0bd0f68f
-
SHA512
e69f0533b92c0048da6138a87c3ae76191d19993fbf003a2e2aebb2cef0e6fd031969d61a1aa8fa22c46fbaae05b5444ebf8da03f30f79665a070533ef5f11a2
-
SSDEEP
3072:C1QyuouHG9r0qMC9y3+uZwle7KLtUqmQG:2QyuooCEO3loKLtUZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 4740 msedge.exe 4740 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4712 4740 msedge.exe 82 PID 4740 wrote to memory of 4712 4740 msedge.exe 82 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1948 4740 msedge.exe 83 PID 4740 wrote to memory of 1012 4740 msedge.exe 84 PID 4740 wrote to memory of 1012 4740 msedge.exe 84 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85 PID 4740 wrote to memory of 220 4740 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\301175a287d4de0ad492a2b055edd476_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeec7246f8,0x7ffeec724708,0x7ffeec7247182⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:82⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8988091133852458326,12153155150580072530,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD592ecc0e4488c1f1fa11b34d29ce597c5
SHA16979048602d2fdd791458e928bb3af10e1a4e142
SHA256d9da9afa3d27b8251c054e92cb41cb40add705ec1a7650d1f0df525518fe5204
SHA512c5f6a1d8bdc38d74837f0d3e30790dc2be72685a061ea87d3b1d5fb33beca494c9bc5591d9b16ba9531836f4bf480a325293b5ecef7d30a991d0eb0645d588f7
-
Filesize
1KB
MD5ce756f69e4161b6caeaf55b73ba0e127
SHA1e2f666a388107eef779bd7d2e715d3ca3cb37946
SHA256050f5fcca50fa23a1afb79e599dcfee65421e852771c69fa2d7f2ec45cac617c
SHA5126b21db91bef922690b89f080fe6233ec64d567e55f72561d08ced2b3ae1bcf9c206e287b92d2c51fa6e811a0fa4e39fbf8a1dfe80a50da41e76f8465a13a699d
-
Filesize
5KB
MD5bb6b91886bec22d66b683141c389a7dc
SHA190d94293dd23144d04212a620fa1caf1b2b45bc9
SHA256ab0f13907d66cf896e8d064e1165b28404380f815b13754481fd4673d3678e7e
SHA512f55644b59fcd5af3121a95463d8b490e7e8dec9dda620ad59c981efdef30d98723d5be588d7d6c7b24d4863f39c360c1cce2bf8718a6c59e0df12236b36052aa
-
Filesize
6KB
MD5d80a5d40fa034e5ca9aafecb202e87d4
SHA1ba4a9c25c336645e34f54223d05ce74668e6c089
SHA2566f1944ea02bf5ac51bf1579391bf64930e54e7e56df2ae78abd777bd52f958dc
SHA512981aef78eeb12b09f426b3271e76f9ea9443249aec9f0fa0afd921ead193a66bf7f5f72f03457e4d292b90d2da098de817d1666bb47feded46d3239f1d5e16b4
-
Filesize
6KB
MD58b6b82d168fae92180f3e5cf16f61ac2
SHA19cf1f99a7f3efff9f1dc99c85e0afe73854d613c
SHA2566c6e94345275a1b495966ae6064e814ddf9e33eeaf68366fc130166b03e30077
SHA5123e7f19b92d79e94879c608dce551bf661e2e64cac3a797d41f36fdbaa8f7082d2d58985308294d5da6286c84cf832597e0bca24bb03297275cea165196d451c8
-
Filesize
6KB
MD53a5fba098a99dc40750a5c90593093d4
SHA1ea61c4973c84dd8b6ba4f7d3e0866b31fc8b9d78
SHA256e28ab314e2b71de1525ef269a076389e067996fb7481cfac4dd711417273ffb7
SHA51257e53ec7e8ea559ecbbbe5c258d1dd9765e11c84f20a61b687beedeb26325b7baaaeef8154e4d3aa1bb1e6a910b4b573691c4085bd25998b710e268a01df6cb8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD542d46f7d8b3698b042ae28e6577f88c7
SHA179de77660b0a0b767cd88a2bf43ed78757094d49
SHA256628598c15784600ab862b07c5f9cdc6f08589ec13a925ce0eb8197046a90d088
SHA512e3edc02be6b7accd9d1cfeb22b7be5bc8577a19ef53eb06ccb1c0ca2e5ad998d15037019471f154371debc4d15bba5879641f949613056dbae2ae79d3f62d85c