Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
4e35f5f2f05c33ae0f75a0015d2d4e19_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e35f5f2f05c33ae0f75a0015d2d4e19_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4e35f5f2f05c33ae0f75a0015d2d4e19_JaffaCakes118.html
-
Size
184KB
-
MD5
4e35f5f2f05c33ae0f75a0015d2d4e19
-
SHA1
ce92258e3215cc85ed00dde62790150de8c46a8f
-
SHA256
d3ac412e41c06220bd89926bd543da806b64289b64b891ba7db4b9c39c7dffe2
-
SHA512
10ff2fb2e776e5e726e242066b6129fd8f7228e2451ad9668312ea5c7edab28c10fd7f56ef261c10822a81feba4f7c85c50d281cbcdf6986542611994e847bc3
-
SSDEEP
3072:VMbSIFPPTPZPykViMbxj2PhP8gmbzbI0bQUPyPCPNPAX/XcXsXMXmXMXbX0XIXKi:ebSIFtPykViMbxjzgmbzbI0bQJX0XZX7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 536 msedge.exe 536 msedge.exe 4224 identity_helper.exe 4224 identity_helper.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 4572 536 msedge.exe 83 PID 536 wrote to memory of 4572 536 msedge.exe 83 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 3300 536 msedge.exe 84 PID 536 wrote to memory of 4984 536 msedge.exe 85 PID 536 wrote to memory of 4984 536 msedge.exe 85 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86 PID 536 wrote to memory of 2312 536 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4e35f5f2f05c33ae0f75a0015d2d4e19_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8699846f8,0x7ff869984708,0x7ff8699847182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1788 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,5318880790332876837,230062154840740292,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52221df03806be2a7146a11fd9189517e
SHA19de9722b9e8672cc69c3c1d937a8afbe6cc2daa3
SHA2566f599bbc199120e5885594ef175ec097f514b00420429f6c2a86d471c5666950
SHA5123dabaa330433ce5010e034751225247201c3c5dd9d704059471e1fa7b394ab479f9cba0ff331dec95637ec3ef2eea47e4445ef06649ef2e224a72dd4ddf79cdc
-
Filesize
1KB
MD5f7b66eb4a201c88d2d1e0a4bfbe2b659
SHA1acc30729012a3498355af3b18514f1f0c40b9c2e
SHA25655900cbd0cad0d321d5e698ab3c2b046da28796534442e268194c2625e312a87
SHA512e25ee83e1d72c2dd4a49317f080b9b977eae420db9c4e579015b735f9f53dbeb8edfe222f94c56463569bf08551ee42e72fc145c4301318dd600b2f5b69fb7b2
-
Filesize
1KB
MD5d7259e6e7792fe3bc417fb12698187fe
SHA11a65a7240ad21707e1d43d4e62dab3b623d55a2a
SHA2569159acf1d24a498ef48fe157fa5c3236339bc88f9dc1fb5ef74e2e965bf7b274
SHA51248feb96351308347486570fee867a80ca058542cfee536aea161be581ae98a56bf54d47873d94bd310db5336443984b93e76afb7c41aecec89e12564e02f250a
-
Filesize
5KB
MD542cd4382bad2273405389b4f81d6d7c2
SHA1906c03675fdd3e5f17a7051213af855c5b8477a9
SHA2562f95a4bc228484efcf13b6afae79804ee0acd246145e9bacb1d9284c2420ef13
SHA512d63d31c333a338dd700cf0884f61152e161b0fdf28a071c152f278bc7df4001b484d2ee8fe6f7306af57846a3e068ae17f933cf3cff9f0beba0957fa84a085da
-
Filesize
6KB
MD53447b0b16f376741657b75b4e4415adc
SHA1035c9934841435b7eb2bb7934b8786b2a1a93d21
SHA25624b78db99d4f86b1e5e89fa6d45e751e21b31d994b0c90e02d16f1361a6a5815
SHA512b834e770dbeac166ce9bd92f946a9abfc7ad83e3ea8a1d1be8d0ba6105c89d6c2a14c607469303e80b06c20b8f9f2cff9ce9bb4477bfe2a2ca9b8dfb6829a648
-
Filesize
6KB
MD586075a5a7017b689f5beaf37c0918eb9
SHA1594c073bd7e1302eff6e20fd9910214a866311a3
SHA2563cb5e1ef054cf820a014a4592096e6ba1eec488ad1e5ef971e07b568592bda8a
SHA512d1540e76646ba0b5b5090cf8962d7da9a91520721abd24f0d51f4b81d4e0021d4a10361bf46bdbd7b38d615f9b08cad65f3cbfef3844dc9e904448a0e6e7d857
-
Filesize
371B
MD520613426c7a9b42f23c9c06c4eb6a7ac
SHA18cae910d5754dedf16eaa5a301ad3e2b8e01d25e
SHA256f6350102682d7d38d6a9b5323d293ed53ff55d84bcdb0f4c8df5e2792aae0be2
SHA512ac0eba8d29b3a0d7a4b4cd7f602bd42df00e981cb728846db3faa9cd07cfbbf27e3439f3f71e7cbdb8cdb8871ad74961e8dae46a843b761a246dd61717af9c0b
-
Filesize
204B
MD5307619a2616a26479b56cd897c6eccb7
SHA1e396c06519d085c0c46c7f7aa1d4fea56caf90bb
SHA25653fd2698df5724b2de3fae21af27ce360211acdc51124495e9b58f6438586047
SHA512d46f545398b661764aa18875bc5097fc2b8584bf90a45d4cd367c1bd901864e08578adae434309955a9a582cd696ccff3969f18ecc5a503efe18e7ea079a4d16
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD582a1d5fb435a1f2b5bd0096ec19c3efb
SHA1c304b0bd2e109f987c30ea60037c683f45c98b9a
SHA256416190cfa223e184d55775ffe5d11183079336ce279ad572531f809763dfcdac
SHA5128a31f0bbe947438b2fabfeeaa451fcceb286a46491d90887148973feabfdd0537804f948a53edf062a1a9cc5455d0dba7373d3bc36445bab1f05dcc41fbaf8a0