Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
4c055effd8a963f17cf8f725720325c4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4c055effd8a963f17cf8f725720325c4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c055effd8a963f17cf8f725720325c4_JaffaCakes118.html
-
Size
64KB
-
MD5
4c055effd8a963f17cf8f725720325c4
-
SHA1
1f1ed4724fad8a69c0e588906464c8dc8d678e44
-
SHA256
a39fc245c2c96865beb24e02b0423e46e130f01c47cab694a669db5b6a46aaa1
-
SHA512
c68217762c3b57636cd3d62aa3ca9a8655872580a46e5adeb864594e333304bf369b583a120ca8c5daad8384285d6c400caeb7a02a421a8d7385e7a6f12c40f2
-
SSDEEP
1536:oRY/DDYu/RMIP2qwQ9hiH2w227ftiHPOGO/Oyt00hIx96tbtZM8WjBFElcXJsijv:oS/DDYSCIjwQ9hiH2w22hiHUphwTlSB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 5052 msedge.exe 5052 msedge.exe 888 identity_helper.exe 888 identity_helper.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 2500 5052 msedge.exe 83 PID 5052 wrote to memory of 2500 5052 msedge.exe 83 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 2008 5052 msedge.exe 84 PID 5052 wrote to memory of 4124 5052 msedge.exe 85 PID 5052 wrote to memory of 4124 5052 msedge.exe 85 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86 PID 5052 wrote to memory of 4900 5052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c055effd8a963f17cf8f725720325c4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3448 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9885918576496336309,12719699301126560481,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2312 /prefetch:12⤵PID:1044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\99e8e3f4-e6c0-4cf7-ba5f-b063eb0457fd.tmp
Filesize372B
MD5098e890af0ee94da2017f8d4e6c77f8a
SHA171f6f12b84ffca32db8e8dc09836169587274b1a
SHA2566699ffb398d9a9820080dc34adce88794c989eec076e8f656bc11c13d393c0e1
SHA512cd7468fe1c63e2394b794680df3b473569ad7ab72645f4593f75b227edabc0fb296504ff98f8e4ecd5e3da0827bc4a5beb0f101a7616f0954f73551ec6d828d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD529e6af53852a88c9432bd1057d89623b
SHA1476c547f4e4a4ad85d6237fa1e1ee87109afccf5
SHA2564db49e114bf0d10f5322851761f965bb3e9c61917e15a11056547a064adce655
SHA512b1779e38acbbaf697bbdc7e5485a5ee21e50c4ebfd0815c0cad4ed4a15916acacb52f0a001c660bc191e3320ebb0896b100131207c7dd61723bdf0ef262e251b
-
Filesize
562B
MD55a4aebe4f36be8462ea12aa36033c447
SHA17a3d67e09657f95254a5dc69bbc85fa68aef2ab8
SHA25624a39614fa23189bc95a622ad10ee58035824b20689ccb97cb24efe894b0910b
SHA5127a41abd598113c21bc267f9326084143650ec0c5875520781c412b372384775ce60e3bf2c39775651fdd9a78f1e5650f6c2489eec8536d5f4175f47e7738c600
-
Filesize
5KB
MD5c695c917378edbe1e16e7e0a4c2b20fb
SHA11c0306f42003db53abc024b4bbc6a329720fe982
SHA25652744c06b7cfcc01b5785979fa676ed7c92f311f44fad1708c9f08a94a7d7c95
SHA512be4a57b0df3b246495e1c74a3da7cd5320f8eea5c57b9b5e8008d3bd254a765bf1633ee1e3e633b8e6b89ad334da90ea8acd714d36484a6e69f92b65ccf24fca
-
Filesize
6KB
MD52ced09105561598005c02231758b8834
SHA138b8b447275648a1af715d49f287822778cb1dad
SHA2562d2cbc35b1405d96e916493ed6a516b4a3234ee22c2d71085a0acbfb208cdd0f
SHA51208ebeaf87a93ce54fb5c177ab86f6df8ad8b7f82ad3e975a180743379a53dfb86fc587dd6d2666b1fa5c150e44445b018b7fefa500414c78612e866056cdcb62
-
Filesize
6KB
MD567a5bc8dc1da90833729533bcebb02a5
SHA16278451adc332a571872357372f7a0594403783f
SHA2564a8cd055353fca5654e05d13fad6b20baefa74ae015dea3e96376bfb2be674df
SHA5124b21a77368a7cceafac9cab4be44ccc777424ae4aa3f6f174647aa6607ded5cda0fccb298bb654d0c16e3e5f96543d227f7860f55a11dae712521a840fc3cd9b
-
Filesize
204B
MD570579ce71ed0440310ac02b8b70b6b29
SHA15ee0678b3114b9a9478eaa3e7b794d16c0523891
SHA256fde0155ad047f0af1ae639213629afe59b570b3f0ce6c5a800902137fb0ffe95
SHA5126faf85dfda2bfe0a413cc5b433f3cb71392109591057c00ba0f46f0641db1617986627f37aa82f2d0b7f90cc3db9a2a62ef67408b378d2163670edf9674be6e8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5adafdb2f57500403ab90337ddc1c6bd1
SHA191e0a68d0c31eae160e00819836633c03b036b92
SHA256b46b1f37ccdd4d504c91195fb3b62d311a23ceed99d2e1c4f65b3d4f3c2704ef
SHA51279869e0ee2496dfb62617002525aaed5524f8804cb88ba696fc3d053bd59707a3ec712967f6ad77878ace11bc0968d08aa00efa0e5a785c447c4293f878c7ea2