Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
3292d6a7a544489871c7a3689426fa8c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3292d6a7a544489871c7a3689426fa8c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3292d6a7a544489871c7a3689426fa8c_JaffaCakes118.html
-
Size
158KB
-
MD5
3292d6a7a544489871c7a3689426fa8c
-
SHA1
36fa1e386d8c4e520b8bf7b5a475ef08380a80e0
-
SHA256
65829f24bfe42ddb8c4ca67d14b884792be4399b0bed94c31eeedf549c106877
-
SHA512
cd585b5db4c15cbc78d9b67e2ff6b9c3a9749c82f3a1a56942dbd4036c21a37152c79c5c569244d48533870f2a7b58acaf7259fb1551c34a1364e304b7e54bc0
-
SSDEEP
3072:7mk1pBDAkirDNvG8rIhrbtKHCXwswxpng4hoC8YyvGX6t8tVLkzF57VzFBPwL/cX:7mk1pBDAkid8W0YyvGX6t8tVLkzFua
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 2800 msedge.exe 2800 msedge.exe 2508 identity_helper.exe 2508 identity_helper.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 5096 2800 msedge.exe 83 PID 2800 wrote to memory of 5096 2800 msedge.exe 83 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 1420 2800 msedge.exe 84 PID 2800 wrote to memory of 4732 2800 msedge.exe 85 PID 2800 wrote to memory of 4732 2800 msedge.exe 85 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86 PID 2800 wrote to memory of 1932 2800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3292d6a7a544489871c7a3689426fa8c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed0d246f8,0x7ffed0d24708,0x7ffed0d247182⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,5858515463686279656,10398864602112835631,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD57d91d12c800b1169c9302901733340be
SHA12fbdb0ff8cc3a106ce4649bf6dfcde02317e607d
SHA2568c9b846a907d722891bbdae061d464429d30f083e9879d52fb47b674bfae71b8
SHA512cee8e6d7dda3fef46b28bbcd2485852730f99be9823885435c7bf786b5c178f98d9b0b93adb42585746b6a66b37434ee34b901e0026cec86f9a82cae135fbb53
-
Filesize
1KB
MD5234d070f375a82dc241ac6152becc72d
SHA1097b4fa1add3a3fa5523c14f1922a0dbc50d1343
SHA2564edefa42f79afea310887ef20fa409864fe7fc61b8e1bb34b8cec0c783201cba
SHA512997112b6222dd5872c8ecdf6ecdb614a36fdc6f3e4fb88ded4296c779bd985c895e4d3e6e48cf725ccb58bee280d0817e68a3195008eea8297aa011a29e4cb9f
-
Filesize
6KB
MD5efdc25b0a90ed3d898e38985a06c8d41
SHA1e12137f9d048c732d179a616102ec429028490ab
SHA25612149fe0379da94e525d52d154f1f51d763e0d8da437beb3bd52b1c0084ea5ed
SHA512f2c2e83036f8eccfaf47c1d1cf7d2ad4ec45022cbd613830bee58c5fa43f9b254efb9389aec9935b96efdd6b7639836e03d3c98ec1d3ce1a4e486d857cb316c9
-
Filesize
5KB
MD5db26dec47673dba105959b8325329c5a
SHA1399b555b6a847f9b1b1421a2760080c727abcd22
SHA2561cc3747616b944883d984520ed7d6a8204400cd9d994b8227037f9ba256b0254
SHA51275f649273e50905d7fd9698d076a9c11d9a8307d110deea01c59fc4bd8d1330fdd6e4e35bbcf849f22dfbc127122c003035cee40a37e7240062ca743725193bd
-
Filesize
7KB
MD552eb751345d5b4ffb190f9d7d08f6b3e
SHA1eb12ff9477efd9abad7b72747a851e2d3d29b223
SHA256d703c7eb914559c838157913f82da92dd6b267c52153d2de16f8aead53e0c068
SHA51242342e8f6284a4fce2607b53eb7cea975dc26ef6c0fae600de28da7c301258ecf4feeb5133a081fe61b6d4bf9aa504baa5b90ad66db9fa2759c3ddbae959a430
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5568a29ec43eccae545c35c2c93f70f5e
SHA16d5e2ae64e7b880a24d6911159bfa8145f8f3891
SHA2563fd1bd7870278f66239d2cd85e6ef374977a6711307f8aa69526c74fc5935b28
SHA512d03461fbc247eaed3cfee19c353f78a7819e0092a1720e9ef94ee0ff410aac1c629d7d7ec5ae39bf87bfec6274acb6e5972b3fd8238abb03d2f5549fd5dccac5