Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
4a4bd150474409bc717f2fd459ebcfad_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a4bd150474409bc717f2fd459ebcfad_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a4bd150474409bc717f2fd459ebcfad_JaffaCakes118.html
-
Size
2KB
-
MD5
4a4bd150474409bc717f2fd459ebcfad
-
SHA1
d4723675019de250dc35d0bc8c7f6e99ba2dab91
-
SHA256
f021685cd0e30c1448d664854fa6e79d5ea111c7ad0606c1f3ccc8260a3c867b
-
SHA512
28472f404d0bd137f2713e9d4783aa7bbed2cf7cb7d5badc157867f8e501feb78b182ff1e218920148b2dccad0c12092735a36176c053064fbcc4dc5debc5453
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 2128 msedge.exe 2128 msedge.exe 4308 identity_helper.exe 4308 identity_helper.exe 516 msedge.exe 516 msedge.exe 516 msedge.exe 516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1604 2128 msedge.exe 83 PID 2128 wrote to memory of 1604 2128 msedge.exe 83 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 4148 2128 msedge.exe 84 PID 2128 wrote to memory of 3568 2128 msedge.exe 85 PID 2128 wrote to memory of 3568 2128 msedge.exe 85 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86 PID 2128 wrote to memory of 2608 2128 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a4bd150474409bc717f2fd459ebcfad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff631e46f8,0x7fff631e4708,0x7fff631e47182⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13158168309343293740,13633716471258519858,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5627333991dae3317b66af943cc162bdb
SHA1ad1381f3a0cee98d346c10336903f420f2db0b56
SHA256c1e53b55f4c979878b43f97e322a2e320f6b470bbcfc9a956ac0f9cbb4e2a02c
SHA512ab0f32913431ee1e9352dfca8bae76d94338897f03206190c3d6e5f13824bed7d5ff9c0857d4a476b4db2732732ff1212de331bfc5ea279d4df2bbbbb058273e
-
Filesize
1013B
MD528199f64ffc38d928577fda8e7cabc57
SHA1889affc3248cc50ae08ed436fc235983dcbb1c98
SHA25625be35b6b0afc365ef637c62188956f6e8928b8ee361259f5dddf02417b89718
SHA51242f42df333ce094aebac20fac14c8fc06784fc08a933d4015621e77e774a9db04b449bb27fa89d50b025d7578ede2c0efc3e2f59729b9b713a16a4a9729c6b53
-
Filesize
5KB
MD5e786eebc47f437bbe66ff1624901632d
SHA1bdfb13d9e7002954f0d053acf7b562f56f413558
SHA25680ecfd7626f2ce430ea46732e306b158593ecb718105c128d91e7c04b6a0e952
SHA51245deee3f8b65d4111be3d25a2bbe02f90ee05bae23251a0aa40d524411474104b10a08d0fbca07d54a656e46876b9b62679ffd86ce9c2b2a64869548d8abce06
-
Filesize
6KB
MD5c6eed3a8d1b4c7397b930e9c89783a4f
SHA17234b922739aeb2d9ccbe37c806e92bc6e498a7b
SHA25646172c5807f94bf1bb429d6b402e0398e1a72b352411dc03bec2cda0170c3598
SHA512fed6e80d7c6bf91344ec0edcae55de0c33c30782104b3a77032b1855eca8320a4778e383ad6f469b06db5eb5955fff095cc00b416ad00d7328a723330cd4fb86
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5858e1587c1d990f5f979ba0b2e0300cb
SHA1030aba9060b299730442f08906eb25fc4ce404d9
SHA2568621aaf2ee0991130f53e0bc09997d319e723fd4c483be06bb00f5140c70457b
SHA512b085e440cdd13e7c0f2a2e2e75fef089bbb21c4b6a826ceb682bf4bf9d9fb0db594333499ca6c7e9f43bc311a0a3bc41f330736da59863734db3ea1117f100fc