Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
309079db6f1438da87fbdf1cd6a26ec9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
309079db6f1438da87fbdf1cd6a26ec9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
309079db6f1438da87fbdf1cd6a26ec9_JaffaCakes118.html
-
Size
16KB
-
MD5
309079db6f1438da87fbdf1cd6a26ec9
-
SHA1
2fe29328f71753db8c2bef2e83ecee4896e673c6
-
SHA256
b38171dcfc4114e44021e2b72de46dc635f42decf8430e901e85cd27e33069ef
-
SHA512
25020d9b3f60bcc454f48df1ecf46562e4a3360bb5b8adb7bcc686f9b475af42ef5c692f564f194ac909c16547f84a66bc6d74389062d437fc20aab869b69103
-
SSDEEP
384:Sf5Kni5XHuf2ef4V4TxIDloRDmTeDmdkrJW3:Sf5KnixHuu24axIDlKSWW3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 2980 msedge.exe 2980 msedge.exe 4768 identity_helper.exe 4768 identity_helper.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4008 2980 msedge.exe 83 PID 2980 wrote to memory of 4008 2980 msedge.exe 83 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 2904 2980 msedge.exe 84 PID 2980 wrote to memory of 3612 2980 msedge.exe 85 PID 2980 wrote to memory of 3612 2980 msedge.exe 85 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86 PID 2980 wrote to memory of 2868 2980 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\309079db6f1438da87fbdf1cd6a26ec9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffed0d246f8,0x7ffed0d24708,0x7ffed0d247182⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,1534239539469116188,3101481985891930402,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD55f5780b7ab7ecb65754aad8e63689d34
SHA164bb48044f299f08db1a457ac569615c6812d65f
SHA256e2ad7a36c939266face3b3f05743e7123e929de0c8d85c499d10ffc305405559
SHA5120c6ffacebbbf442977dffd474db722b30e04cdfd38f8a126428cb41665c0d4da2f444c7d4e318b3db7cb8ba7d3abeb7230b5b461120df067c90b94d1e58778f8
-
Filesize
644B
MD5c5ec00f0a2df0b09aa7f0d0b8ae9e19e
SHA14bb4dd8398385774d482dab5e4fe9f7a5d8a6f23
SHA25699b0b2ad8f7a6850ace3c04dc4fe6cb968069af934511c45eea4bfe08c0331ad
SHA51277b8e67b485a40ee8e5194f838c350e0a712571c8260f2a663808f6170fe8bca523c9333cdfdaca70fe6aab89e9b99d3a752f9d05fc19f24b4b7f3b4a8732c64
-
Filesize
6KB
MD5d99754cdd0dbb2037f8e368a80b0b3be
SHA15e20b5930a96fb631ec3e8b65c23b834635df6ba
SHA256caa83a1e66f9781f08558f942950f217c3b4b468b05d070d14d33f935c86672d
SHA51248d15bf642113fc550822400655cf3c82ff6c3b6eb90af5997bc6aa329a2132c4a357ea8fe624bec31f819af8e59d384bdcf6df05ce47cb8f2bcdfb11da32bab
-
Filesize
5KB
MD5ca40a4dda1e2c7e0b3722d7eb7f6f94b
SHA10bdf2e96d49d5f9fc225a5e024c51683329db6b3
SHA256ff250ac3c108eeb575efc7293bdf7739ea5265968d4855ca44b9e6ddae156123
SHA512a68dfefff19354370c05a7e5bd2128a78080cdfe2e216a320696886dc6bbc1c422ada3691b258cdf8e70dca46dd181509f110e9ac970d98df6c4efb56563e37b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD554a3dde70aa3df82934726b9d884b32e
SHA182e5c7b27272c9467b90fb4b3deca156ed58ae27
SHA2567021c67e60819ee52b299e250a1985d87690b05c49ebdd1a2228bece100c1c17
SHA51227d709877c3353bcd3886db581d68f6084eb979334a6f88d07d4d51c3de25fa73a8f89ecf660220b72b77bc497d78fed7b386a9a03bf0f9beb0738119d38be1a