Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
34ad3c2a73569a321885540b65aba02b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34ad3c2a73569a321885540b65aba02b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
34ad3c2a73569a321885540b65aba02b_JaffaCakes118.html
-
Size
62KB
-
MD5
34ad3c2a73569a321885540b65aba02b
-
SHA1
4e57a25458dab472b7cd0566deca23e3e95a5212
-
SHA256
0bdad8ff41b7014f8d7f0b9940f7275c7add48024fbba539d7573f762f1498eb
-
SHA512
4f48bb835c1a993bfb104282f69fdb5cc477ba54232b8152d112f91a21830c1a4ab6a969c2448ddad4e9818bca2b51c0e0cde13be7381758179547420c367cde
-
SSDEEP
768:ogOriWNcaSoagGXRacxYVpQYnI7x48Pdql+/Iep7Q71ODwNtfdmY2Shh:f/JRa2YIlHdq+7ctfdmg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 2776 msedge.exe 2776 msedge.exe 4844 identity_helper.exe 4844 identity_helper.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 684 2776 msedge.exe 82 PID 2776 wrote to memory of 684 2776 msedge.exe 82 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 1044 2776 msedge.exe 83 PID 2776 wrote to memory of 4312 2776 msedge.exe 84 PID 2776 wrote to memory of 4312 2776 msedge.exe 84 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85 PID 2776 wrote to memory of 3092 2776 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\34ad3c2a73569a321885540b65aba02b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7fffaf0346f8,0x7fffaf034708,0x7fffaf0347182⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14021267440855056776,13881417518491136813,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5160b184284fff3f33f3bf3e9c37d079b
SHA182e429e5758f874361d5ff5c563f22cf54b180c7
SHA256452dac887783ad1b17ea79da8de6d8d836303396e9c19a679210f5dabe0b6c3d
SHA512f38c212e59d9dd424c2f2011eef929b585ffee5e2f1af77e70efad2aae0af47c6c47e745dff922e1518c7cdf76bf6d8ebe46d843e09673a63c0759fac2ea56f5
-
Filesize
1KB
MD5bfb5ee9e18b68c0c9128047530dcdaf6
SHA1fc62934954063ae3eceed9e7b70cb86e51e71ad5
SHA2563019717bd8da1f2ade3348564100479c941ef33a8329aec302710bd7d856c6eb
SHA512d42470ac106a6c46ccaeb019938b1f0f59c9445cc866ffeae40f8100fce4b3ae29ec87629bbba2e570a36ccd77b6dc87cb9dd27536a9010712d55e5491477add
-
Filesize
5KB
MD5c653a4e1c1c72a3161eef6ccb090dbd7
SHA139a1311b7e65dc3da79bd608ac7c7f1d46aae79d
SHA2563cd7c3f9a613654f21950c3423b970ad466de0eabd423b5858a3b28120674341
SHA512d69e23976c2475f377a1df99676f44e5c0aa29c69807b504a682eca02d815bedda392f1a397341c6a1feb3146df2e2e53c9bdb20d24cc2358dcdcd5541054a32
-
Filesize
6KB
MD5b205c7d8e599106733ed0458196e9a5b
SHA12ba6308344e9634511102377eb4d4af81a80c557
SHA256402f82a85f0e7221eba47fc39f4de47c9839995feeee46c6006a7b4f38acc153
SHA512e2430037d0edd73126e983e83a223498b7d953f4fe31f01bcedac0472d191cb60b3d9a17eff62ec314310b1bef199fe17cfe8bca038f662f9d2ef58fe9f866ab
-
Filesize
6KB
MD5a03ced7b2d37b50affc7e5382b850953
SHA142a37b415f50de38bb68b012fcfd1a75e21eca62
SHA25654fff9d7e55ee907e7018cfb35b12847fd6edad94f61917dd163b0281f3d8f81
SHA512ef8c0fae18bb3124c81963871db59228730aea9198d6713b04a90fa8a0365abbe461ce15909136911bc7fb4bc75c601705f869ca7706b4e3609b3e00de5880de
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD592339bd1717a8e29b117f5e97113b9da
SHA1d1b84b0d28facb05be36716c273489b0c21cc322
SHA2563b83353ad4ed35355815dd20aa74dc4b9dca1b0f27ee713c95d2b6002c45d20b
SHA512f4fac4fb5499547d96d97fd3e3f40e2cf0e80f0051b56d46ec384794e35453a9d9e9c33515b1d969596ca3944e75f9409a2f76c0e23a9248293d16cd3a73f7b1