Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
4df66c795acacda8fba65dd540d77ed3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4df66c795acacda8fba65dd540d77ed3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4df66c795acacda8fba65dd540d77ed3_JaffaCakes118.html
-
Size
109KB
-
MD5
4df66c795acacda8fba65dd540d77ed3
-
SHA1
0527ee921bb244bebad580e29128149b015d7da5
-
SHA256
69bc184a1b8d2efe29bee402a63ea5a7737b1bc971f830ff667f6db35f1e65ce
-
SHA512
7568b78d5a4c4152cd53fce4cb9f8daccf116de9cd50dc5085bda05bcde24aabcc6f11b14da87d57171e94401d7e804baebb08a5b4997e982fd6cf01db00de84
-
SSDEEP
3072:XUcjvG8rMdcXmNRS/RHHCBtOod+hDpRkR8O4Vnt/V:lrXmNRrcRkR8z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1676 msedge.exe 1676 msedge.exe 2996 msedge.exe 2996 msedge.exe 4428 identity_helper.exe 4428 identity_helper.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 4468 2996 msedge.exe 83 PID 2996 wrote to memory of 4468 2996 msedge.exe 83 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1196 2996 msedge.exe 84 PID 2996 wrote to memory of 1676 2996 msedge.exe 85 PID 2996 wrote to memory of 1676 2996 msedge.exe 85 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86 PID 2996 wrote to memory of 5788 2996 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4df66c795acacda8fba65dd540d77ed3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa127d46f8,0x7ffa127d4708,0x7ffa127d47182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1336 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4281403613642868234,14185829331177435719,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5560 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b6886185b6b71391affe81be8afbd5d4
SHA1166a0ddbbdbaeda88ccc7d506318f0b7cee369da
SHA25630bc3fb30b01f07754411aa6ac1635452dad7616a2f77d34756f8a8192241369
SHA51244d377dc505d912d755b4ec57c45b4cacf0d9ecfc138f1f70e63cf79a8f93c7df1c87066709c555308c36595350cb4be648e7a73a2583e523c2c717e38cd6612
-
Filesize
1KB
MD589cb7f37fc55397b197a055182ad5052
SHA1801681be21cec8cb9238167de7012877badfec34
SHA2565df6b896fff04a75ffd9fc82e753b3bbe4c48dccf9a473808140661b591a98eb
SHA512f1330864fc51058e2900de12ce8096890bf97f66acb6b7958ff2d6d1a4593d86750043287b9a2972574777abc0777d7c0d678ca407dfa1643224a7dbb9f0d324
-
Filesize
5KB
MD550ec0a64db495e876ec36be86b56c894
SHA1e27cc9f4117742ec9c0bc3fe9cc75d0dc258f016
SHA2565c7ae589dc76e7cfaa26dfe9ea9e56fc60b3138601d69869f3bbdae77703ebeb
SHA512ae1d4ba16fcb431d1035483a20929f27e1dc2bfa6214121c9850aa1eb937e035e321320b5cd8fdfc5f682508ad287f01a9ca7ef0f274f3cf787c7bbda94a391c
-
Filesize
7KB
MD5b2f3d132bb3c3f651850fd71d7530a2e
SHA17eca71c76457a62c3a1b7afc2918dd7ac3c356fb
SHA2564f64fc0869f27dbcae74d9135a9d9493a28246cc76b3db36320f195aa85bf726
SHA5126983143ec4d8cdb1453175d9a98fae34e326843260e6df37cbd1a9bc7d57dad835d42ceb5c3fe4e9f4d7fff5bfe6102163f90753ac711d8a8ef77142485cc38f
-
Filesize
6KB
MD51679a889fd54698fa33ff0f39d6e4992
SHA1f2c99ec19cb52023909d356ec248638ede790aa2
SHA256027ef823a23c1f173eaab5f44b010638fbc66c1ee55a3a07b7f6fa35af99ff33
SHA512094e6ae802025e4e30d5ee9f43df95a01dd5e8088d45b5d783f2b396ddabd43dc71344e17dc93ceb68e4020892bbae1c3a6a0ddf4781d3ab7b2a0badefe6f520
-
Filesize
6KB
MD5313ed56f6118e3f785dcb5a1752ffb6a
SHA1b0baedd22a250eca871beb991ef4dd4a7f6ddb5f
SHA2563fbb0787cb1575709aa3ae3fca16b259bbc5861a899ec388d11dcb5aafddda77
SHA5122f05b46cd6efcc080044ad27dc8ea93d9408f9663d9be1bd8c188af471d8f5721904929a18b577bed57cac6496f2bb11e39232830bb0d4924138e400f9bf4420
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a40a31cc731a779af77470f350370463
SHA128f3a7742b50191fc6a8f8e8d9dc04f74b9c669d
SHA2563dc334c701970f8dce7975de124dd1e911d8768f9c3e266f1c84f6c5083e158a
SHA5122a29b3d314c2d2c45509d17b909bd31d3aa725909aca059ded6f88820e5dff898fb80291f3f3af67d4daeca81b77596dfab7c39ba8d8b2fed99411cfdddc5004