Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
320e06ba2532e76b945e6645d499547c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
320e06ba2532e76b945e6645d499547c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
320e06ba2532e76b945e6645d499547c_JaffaCakes118.html
-
Size
82KB
-
MD5
320e06ba2532e76b945e6645d499547c
-
SHA1
59a9fdcb3dc2a7e008f3132be77767b90b7fae59
-
SHA256
dd578391e10c9f8ffeb7477e88bf2e01637d843c59581b4cce1717649c0754f6
-
SHA512
df4952505444cc41136b0a476db4fe83e57068f8acf886984090695756d8248516636cbd709eeceb3d4798ec5d29cf7347ab429a5a1d3abc4c49f8504db73527
-
SSDEEP
1536:frExMjDNcc2slv+uTN/ZfVN73y7Y7Bvnt7Z1:f4xMjDtOuTN/Zf773yevnt7b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2160 msedge.exe 2160 msedge.exe 4404 identity_helper.exe 4404 identity_helper.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3144 2160 msedge.exe 83 PID 2160 wrote to memory of 3144 2160 msedge.exe 83 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2052 2160 msedge.exe 84 PID 2160 wrote to memory of 2528 2160 msedge.exe 85 PID 2160 wrote to memory of 2528 2160 msedge.exe 85 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86 PID 2160 wrote to memory of 1976 2160 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\320e06ba2532e76b945e6645d499547c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff05446f8,0x7ffff0544708,0x7ffff05447182⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,6956399030323788731,4352171690543643796,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5840ad4f745f92bd0da637e2a07b9c4c6
SHA180625160748e8bedf34d268bff59966e2f50790e
SHA256eda3d2290d78ab883c46e41d717600fb9b7a99cc692572520c0e07d15461fd36
SHA512f966e339cca88568bf7436165917237e21b4e5038590619868629c0d0129d5edaf9436260f8d017ffd71ff927bcdf7042c5adff5176a60727a8d45f195426070
-
Filesize
3KB
MD5fcec13bacdef2b080c575a89b796186d
SHA1325729b5a48112e2822b5e2973e30c7a4d86e94e
SHA256554dc13c597f8a17849c7a448ee78cebf9f6aa6413883415990b85a925571495
SHA512f303a35c75c6d325d13af3c66e039a9e824eef8b9e9fd88ede6b8e4214ee29569f99ebe9e306fc430556d33107bb728ad201d715890c483aaf9a05a1317c64a4
-
Filesize
3KB
MD532c113f856e5b5b02f8bf4f0bb37a5c6
SHA1fe1ef3d7a88790560dff759406b491b0d487215d
SHA25662773d9d88df1b505150ba1a914099f342c0e29fbf2b5c020a054607c13d64b6
SHA512c300529cf9272375c1f8feee078b353157a096d175924bda5f93d1d78a23eb567e50d8a2ed0318be6c13d9670779d049e81c9b602df559f3c9f7f68238e86970
-
Filesize
5KB
MD5f9ce8409ce99efb87a7496cf2a2230ff
SHA10bfd49db2b03f449ad70f33ea1b99da49770ee10
SHA256e7e45de4cf028ba38b27b233fa57f52d94566641753eb6278d3c4dabba699b49
SHA512b2f06f05688a2c7c6cb94871398b578bbb63ff57673b0b1fdb12d3a974114a74a458086fda7d97e7bfa89c46fa8b6c7808b879fc2f1a98b546b01c7ed0084a16
-
Filesize
7KB
MD5e4d1334b56ac9fcf156b49e64e23bb00
SHA195bdb87cb2eb56bdd71829e7abb845334fa07e94
SHA256edf217275c2ec097c1151c307d8c468f57aaf3063d52e53886674ba3282e8bc2
SHA512addcc533c7adfe587546b58610b400fe8500e173ca3d859878d646f0f0d5bf507b753621451beee690c5dcf057eb9fdcd43f3b2a481227d8f76f4e8dd74e6ec5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e7f53339dc902d52a7a19ed68994e098
SHA1815c8bf450d904cbec0a7fa9dd8749d1310e9c0f
SHA25608a682bb2e772bd3a29958ef9354e8fc6ef9bfa59c9771da7024575879fa6c26
SHA512311f55a4c18fdab4ac60620bb56eb82ece6d2c1da47ce9665e9d1a7ce36d2432bfd26bbdefbb5464d382781eb7139ceb5bc444415ba375be6336f703da762a40