Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
46d06f319e61b88917b45779690fa496_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
46d06f319e61b88917b45779690fa496_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
46d06f319e61b88917b45779690fa496_JaffaCakes118.html
-
Size
61KB
-
MD5
46d06f319e61b88917b45779690fa496
-
SHA1
6a84212e642c9bc401265363b4d93fbcb5b3f994
-
SHA256
ca28a2e2def7e4cdeadca269f95530bd7afe2dc0e268b25241f533a98ddf58b7
-
SHA512
4fd5aa0b10e4d70081eec584bafe4969cec79d2be677334362edb1c09e9d32e881332ca32306a7303ca0f0a69853857c5b6c30a3ddee88cd8b696156f58f5919
-
SSDEEP
1536:nWw9+Oq3x1n90dkxxI9q1qxdF9Sfetx89wxM9exxv9qWgxxk9qCaxxO19qbMxxOj:nWw9dqXGdAR1skWcVCmOOb4DUCm1tlo8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 2368 msedge.exe 2368 msedge.exe 4560 identity_helper.exe 4560 identity_helper.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3096 2368 msedge.exe 82 PID 2368 wrote to memory of 3096 2368 msedge.exe 82 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 1492 2368 msedge.exe 83 PID 2368 wrote to memory of 4860 2368 msedge.exe 84 PID 2368 wrote to memory of 4860 2368 msedge.exe 84 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85 PID 2368 wrote to memory of 1200 2368 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46d06f319e61b88917b45779690fa496_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1e8a46f8,0x7fff1e8a4708,0x7fff1e8a47182⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8060362434430596915,15768343298432688818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5706bc24a3a0bebcbefb6c31598580f25
SHA1496b58c53d72aa72a6331d30e9485ac5cc9977ee
SHA2567b048dfdcf9fc0c2d607b47e9c7a6f406bc850f345f0c2aac337a55d37015910
SHA51246f9d3a352d9b54fc7a7601e5bc4a26bd7fd0bdc677a1f2267da2d8b3f518476bb38095ce559542f4888e85ac359b323b88557cba7ffee02b6087e578cdf6c41
-
Filesize
417B
MD53b319034814835a1f3579e8b5309e6ab
SHA1a352654c94b1d9f320e59455895a906ca11a3dc1
SHA256e58944a41064abf348495c48e79ee8bcb949e3dd9b37c2bfa87938df697e8a97
SHA512bc85f1cb5a82e281927877f4887acb39e362199e27f86e67f675f9f3ddf9a53f3bb51065b138d991824d016bda00eecf1c0b627822f4d75c9129fd1819bf7cd4
-
Filesize
6KB
MD53b5e426e194ed066cd2b493c205cca80
SHA1e938d219d44ba3cb4285a79b2e1152249edcacbf
SHA2561f2fed310b84c4e8cc83e45703536cbd4b5cf4782a81166e7ea33f6cf8540421
SHA512b115456a453510f3ce43121b4b38144124be0bf9d615edbfd8856895bfa967f943978b56455314d1ed60d35ab61339d39801fa3284c7b520d284da236692c8d4
-
Filesize
5KB
MD5c5c69e01c738d31ec15cb6457060e7b9
SHA143a070f204877e2eef33ead7e82d30d3355aac71
SHA2565e49485a6bb5c39a3530704bd50f6ed48e8821868246221077d2ed11d38a9a54
SHA5125d9c745fb6288d492d692839519638621a41739cf2b0a97bf95d43b5a8c01ef3d256d5c21a942154ddf74365fc188f589c8f254bcf1930f785f4d449a1feebad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD566aacd8e091a27e5ae92e782dcd529ba
SHA18634a4c6867c0a69d3530a77b45e453ab1e32d0b
SHA25618365265dc630089898b22f53c71e4d02c111fc3f10fa9a0bea2c7faac0ebc2d
SHA5126420fbd7a91278a9489266265d1a3b7188b2ca3bafa6d4751a6b78c305edfadff7b3557061de81d71de778a1e97639d24c91fdf69efebae4711b52c53b66bb0c