Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
46132c41161054d731b207cf24ce9acb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46132c41161054d731b207cf24ce9acb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
46132c41161054d731b207cf24ce9acb_JaffaCakes118.html
-
Size
27KB
-
MD5
46132c41161054d731b207cf24ce9acb
-
SHA1
fe8c9bf01404841b39bb0caa6fafd04a781973d0
-
SHA256
670d36469ab7a5e0d2ce2f1ca1e10b35a1c38e0bbefec637775d93c4c4161f01
-
SHA512
885c4cfa07a0437fb00d4a976d3d140913a08449ab60f43b9c4131986aac5360e08b92625b6d65da3558acd266babb87935739d5326a8b732e463b4338203aac
-
SSDEEP
768:STyM02ereKe7ozEdhkdSSuPQgY20Bih6tIug4+uFoKeAkeiO:Sd0dreKe8zEIhudY20U823PuFoKeNeiO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 844 msedge.exe 844 msedge.exe 2264 identity_helper.exe 2264 identity_helper.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 1108 844 msedge.exe 85 PID 844 wrote to memory of 1108 844 msedge.exe 85 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 2268 844 msedge.exe 86 PID 844 wrote to memory of 4936 844 msedge.exe 87 PID 844 wrote to memory of 4936 844 msedge.exe 87 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88 PID 844 wrote to memory of 3732 844 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46132c41161054d731b207cf24ce9acb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14727411143665226533,3700696592262356858,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD590c64712466e59367861551b3bee51a8
SHA19e327d3d146b2d82b831587cfdbee16887dfab31
SHA2567900bc4d807dd4348ee61e601dc9646487338168b18079bb6a187dca22592c37
SHA512a47f64ffeb28a39465004cddefb3499bfc2af92b17b23c2880b6234c10b5b4a033b378adc87b9611575f2f3e8906d846731fe91b9bdaf6e44605a8f7c2d41426
-
Filesize
385B
MD56f27a3506b3ef7d9a5b7680876701383
SHA10cdb1d1fc1e82643395584224d16154d74d9a917
SHA256d13f41eceea2e10ef2417844423772f805fc26f3a571bbe37bb989b88fd41362
SHA512b84e9f24235a176f4c62c34bfe9a0df03f7ac8a493a4676092ab9cc1e82189682c908f5b79e2c2f425a8435fff6563109836ba7b647f00dee5fe0103347a43e0
-
Filesize
6KB
MD578b12f4fa77924dce9e1033a097d0345
SHA1b354cafc841518a6960c523f8849fd2f9b3fc614
SHA2569c4ebaeab8cc6896d782b84c4d1a670c0ebe62b2dab997f5b12d62932c3843ea
SHA512da213719bee13e9046c898703c441e3ddbb9fb0733ba6bf3a098ed0f3f57b72d8e58ad2e7deb7dc4d436d34f5cdb0f71cb13303d2c5e1936c269ff58d8e52064
-
Filesize
6KB
MD5cc60896eda13f86462bb313b7a27ac03
SHA1b464cc8f8cac68e3263f347198b105165c222e3f
SHA2568c1a3a70d3b15050bfcb2b36040077276789fe1d9d5bcb071c12683d0801fff0
SHA5128f7c345c46facfafa1ec4274a667245fa6bac3d230f335985b3501409752afa996c405b4bafabb97ed9e1f8be358dc0c02a3138a1403284dc60e6830b08c590e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b817610529747d38255907e318a7cf55
SHA1725c32a159c5f478c36c31f18bf085e99119abeb
SHA256e923af90817ee42e358d5825e94e601a58adb96d45e7dcaedc482567b30f0640
SHA512fd0cbc6e520479c1fba5c6bf05bfd332ea8bb7f982be9a1e238dc4094f6ad592671d2ca1225affc612b5130bd0114bebdc28933e55cabeb7fc3d6ed6c02e0a94