Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
5d516877f8107633ded5b814b05e862e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5d516877f8107633ded5b814b05e862e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5d516877f8107633ded5b814b05e862e_JaffaCakes118.html
-
Size
157KB
-
MD5
5d516877f8107633ded5b814b05e862e
-
SHA1
dbe7aa8fca0ca2fd288d77b083b37d7af1335e90
-
SHA256
c3ac6a04db354d333c9c58e51938007c54196951ef49bfddb98e6f4af346ad15
-
SHA512
1f973f539d471030f9ebd2920d5eb083720122b96cfa0e9c1ca836c61c37602285212c0a2f43a3e922371c155e53dcf6e354353a667fc159b83498ba3ec281f4
-
SSDEEP
3072:6r1WyeCazHEE7Ac8EAcKErRcVhIVs2LQeWrE2Qt/U1jLzyXPG156juNBqJyz:6r1WyeCazkE7Ac8EAcKE9c142LzyXPG9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 2920 msedge.exe 2920 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 3572 2920 msedge.exe 83 PID 2920 wrote to memory of 3572 2920 msedge.exe 83 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 2748 2920 msedge.exe 84 PID 2920 wrote to memory of 1716 2920 msedge.exe 85 PID 2920 wrote to memory of 1716 2920 msedge.exe 85 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86 PID 2920 wrote to memory of 1760 2920 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d516877f8107633ded5b814b05e862e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa75c46f8,0x7fffa75c4708,0x7fffa75c47182⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4389846481201896170,3805229991559434464,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4389846481201896170,3805229991559434464,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4389846481201896170,3805229991559434464,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4389846481201896170,3805229991559434464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4389846481201896170,3805229991559434464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4389846481201896170,3805229991559434464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4389846481201896170,3805229991559434464,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4389846481201896170,3805229991559434464,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5b2dcaa7a1b5254aa2c2cc22fd4ca79df
SHA10ebab72e0b0bec14275d09e50b16a6589f335af3
SHA25647c949008d73b8a14d91956a7e21779bd28272342c45ca500b79145a156e8ecb
SHA5126cb77bb1ce5a613bdca5d37642a58ab3d58a40a1015c8a2f6edf89a4687bc0b06a010561abea7d2dec47258c4fbb7ea5a5f8895c7b8e510c44c03b53fbdf37bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a7eeb5c785fb18ce4694ea6ccfb2b057
SHA19e219f495a13d73629b4d9fa830a625790be727e
SHA256d4f869a002441052e11246d9926d20b823a0b0bf01f33a61c9872c603516d8e6
SHA5125f18ca4b8288536777576d7460ae90979ef634e3df932b8ddb252bcc7de315e12cbeb8463e92357e387fb2a82f349e3300a9051ee570112f74c75212e1bc1961
-
Filesize
2KB
MD51a82524e30fdad0007534f198670a2bf
SHA1077f072191c42e425b05a909bc5475db968dddab
SHA25625ca082d53420ae537cf7a22f0e23f0b6b1b45fc52683506a809223ed2079db3
SHA512bda9ced3e9b3c03d05cd60f2fae214eb837aae6af0b8384991cebc387e71b188471a8d2cbd7910b3c60259f3e9fcea890b76e712a560e400d0826853ee62f492
-
Filesize
6KB
MD57cf0b71aa6e9269cdb0eb89031b70dd0
SHA1319838fc9ede8853d22d2a742f0ae4999f057b73
SHA256a893b8191ac3ff4a32a3d210ddf5030fa4fbbc078055bc715d6a46e0a47ac6bd
SHA512271f10680d4609510d21afb1bfe17988e89023ca3ccb2c2193d82793045f3682b5e18d0a91846673f8bf18c979721cd0f8c07b3f9a14b9b73c502dcf92b39c1a
-
Filesize
5KB
MD508124aa7b0187d5650aa82e54a194c36
SHA1a2f01343aa8f723abca36f72caf600e807e911ce
SHA2566d9f4c72b765f3a3e10897229da1b76da598747e46d4f9766c9ce8bdcd50efdb
SHA5121f1dec2ce51a5d351f27c808f3c1684dc7ec372f739b6144aa505db5f592a8e77ee9f781b12917ce04f6ae26f67edd695f7fa293a5f590742c66286bc9d666c7
-
Filesize
7KB
MD583ce5b9205b9f2152d80803df48c6da4
SHA164cd073b0a005bacc30aeda7d4f7f1e216014f2a
SHA2564d72e8bcc798c427f64e1408c2c2420880d973ced93405cfc300a777eef261f5
SHA5122f38bbbd6126767fe41708fe1701ed3a858c35931e0ed58ca84e873ab036958e5477f11129af06be2c4cc1022b76d32fc08fc1b926136f00ee3333a24f9a6916
-
Filesize
11KB
MD535f3277bd7bb5eb2e1bde0902d912d6d
SHA1bec89e68ea5de569c2ce7d6abf93e7e7f4f20c69
SHA256b51c382a1d7182c8efc8f5048837376070d6785577480c8ce155b1fce4e0365e
SHA512df027191c83a302dd4a1386fc9b430e134a5151294d336a243c69ab055c0f4e35957fa2fbd2fb67267b1b83da5e8733d6ed8b367846ba5df972df1c73630b1b5